retitle 752277 vulnerable to downgrade attack on get-upstream-version.pl
severity 752277 critical
tags 752277 security
fixed 752277 1:3.5
found 752277 1:2.8.2+squeeze1
found 752277 1:3.2
found 752277 1:3.4
summary 752277 0
stop

The scope of this bug report is the fact that the package is vulnerable to a
downgrade attack on get-upstream-version.pl. As Jakub clearly described :

  |  anyone who grabbed an old version of 
  |  get-upstream-version.pl and its signature, and is capable of MITM, can 
  |  still exploit bugs of this old version. For example, this bug:
  |  https://lists.debian.org/20121212191044.gd29...@seestieto.com

This vulnerability is an incompleteness of this change in 1:3.2 :

  |  * get-upstream-version.pl: Added validation of link to flash.
  |    Thanks to Henrik Ahlgren for reporting the security issue (on
  |    debian-security on 12 Dec 2012).

A solution with minor changes is to replace the keypair used for signing
get-upstream-version.pl.

A fix for oldstable will not be provided. I agreed with the security team to
request the removal of the package from oldstable instead.  A fix for unstable
has already been uploaded, see version 1:3.5. A fix for stable has been prepared
and made available here for review by the security team :
http://people.debian.org/~bartm/flashplugin-nonfree/D5C0FC14/flashplugin-nonfree_3.2+wheezy1_amd64.changes


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to