liblwp-protocol-https-perl vulnerability

Related Vulnerabilities: CVE-2014-3230  

LWP::Protocol::https could be made to expose sensitive information over the network.

It was discovered that the LWP::Protocol::https perl module incorrectly disabled peer certificate verification completely when only hostname verification was requested to be disabled. If a remote attacker were able to perform a man-in-the-middle attack, this flaw could possibly be exploited in certain scenarios to alter or compromise confidential information in applications that used the LWP::Protocol::https module.

17 July 2014

liblwp-protocol-https-perl vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 14.04 LTS

Summary

LWP::Protocol::https could be made to expose sensitive information over the network.

Software Description

  • liblwp-protocol-https-perl - HTTPS driver for LWP::UserAgent

Details

It was discovered that the LWP::Protocol::https perl module incorrectly disabled peer certificate verification completely when only hostname verification was requested to be disabled. If a remote attacker were able to perform a man-in-the-middle attack, this flaw could possibly be exploited in certain scenarios to alter or compromise confidential information in applications that used the LWP::Protocol::https module.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 14.04 LTS
liblwp-protocol-https-perl - 6.04-2ubuntu0.1

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References