CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N
AI Score
Confidence
Low
EPSS
Percentile
100.0%
Debian Security Advisory DSA-3253-1 [email protected]
http://www.debian.org/security/ Thijs Kinkhorst
May 07, 2015 http://www.debian.org/security/faq
Package : pound
CVE ID : CVE-2009-3555 CVE-2012-4929 CVE-2014-3566
Debian Bug : 723731 727197 765539 765649
Pound, a HTTP reverse proxy and load balancer, had several issues
related to vulnerabilities in the Secure Sockets Layer (SSL) protocol.
For Debian 7 (wheezy) this update adds a missing part to make it
actually possible to disable client-initiated renegotiation and
disables it by default (CVE-2009-3555). TLS compression is disabled
(CVE-2012-4929), although this is normally already disabled by the OpenSSL
system library. Finally it adds the ability to disable the SSLv3 protocol
(CVE-2014-3566) entirely via the new "DisableSSLv3" configuration
directive, although it will not disabled by default in this update.
Additionally a non-security sensitive issue in redirect encoding is
addressed.
For Debian 8 (jessie) these issues have been fixed prior to the release,
with the exception of client-initiated renegotiation (CVE-2009-3555).
This update addresses that issue for jessie.
For the oldstable distribution (wheezy), these problems have been fixed
in version 2.6-2+deb7u1.
For the stable distribution (jessie), these problems have been fixed in
version 2.6-6+deb8u1.
For the unstable distribution (sid), these problems have been fixed in
version 2.6-6.1.
We recommend that you upgrade your pound packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: [email protected]
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 5 | alpha | apache2-mpm-event | < 2.2.9-10+lenny6 | apache2-mpm-event_2.2.9-10+lenny6_alpha.deb |
Debian | 7 | armel | openjdk-7-jre-headless | < 7u75-2.5.4-1~deb7u1 | openjdk-7-jre-headless_7u75-2.5.4-1~deb7u1_armel.deb |
Debian | 7 | s390x | icedove-dev | < 31.3.0-1~deb7u1 | icedove-dev_31.3.0-1~deb7u1_s390x.deb |
Debian | 4 | mips | apache2-mpm-prefork | < 2.2.3-4+etch11 | apache2-mpm-prefork_2.2.3-4+etch11_mips.deb |
Debian | 7 | armhf | openjdk-7-jdk | < 7u75-2.5.4-1~deb7u1 | openjdk-7-jdk_7u75-2.5.4-1~deb7u1_armhf.deb |
Debian | 6 | powerpc | apache2-suexec | < 2.2.16-6+squeeze10 | apache2-suexec_2.2.16-6+squeeze10_powerpc.deb |
Debian | 7 | powerpc | libssl-dev | < 1.0.1e-2+deb7u11 | libssl-dev_1.0.1e-2+deb7u11_powerpc.deb |
Debian | 4 | all | apache2-src | < 2.2.3-4+etch11 | apache2-src_2.2.3-4+etch11_all.deb |
Debian | 4 | arm | apache2-utils | < 2.2.3-4+etch11 | apache2-utils_2.2.3-4+etch11_arm.deb |
Debian | 7 | kfreebsd-amd64 | lighttpd-mod-mysql-vhost | < 1.4.31-4+deb7u4 | lighttpd-mod-mysql-vhost_1.4.31-4+deb7u4_kfreebsd-amd64.deb |
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N
AI Score
Confidence
Low
EPSS
Percentile
100.0%