Secunia - Stay Secure
Gartner
Home Corporate Website Jobs Mailing Lists RSS Blog Advertise
Software Inspectors
  Scan Online
  Personal (PSI)
  Network (NSI 2.0)

Solutions For
  Security Professionals
  Security Vendors

Free Solutions For
  Open Communities
  Journalists & Media

Secunia Advisories
  Search
  Historic Advisories
  Listed By Product
  Listed By Vendor
  Statistics / Graphs
  Secunia Research
  Report Vulnerability
  About Advisories

Virus Information
  Chronological List
  Last 10 Virus Alerts
  About Virus Information

Secunia Customers
  Customer Area


ThinkVantage System Update Missing SSL Certificate Chain Verification

Secunia Advisory: SA30379  
Release Date: 2008-05-26

Critical:
Less critical
Impact: Spoofing
Where: From remote
Solution Status: Vendor Patch

Software:ThinkVantage System Update 3.x

Want to know the next time vulnerabilities are fixed in this product?
- Companies can be alerted via email and SMS!


Description:
Derek Callaway has reported a security issue in ThinkVantage System Update, which can be exploited by malicious people to conduct spoofing attacks.

The problem is that the application does not perform SSL certificate chain verification when connecting to the update server.

Successful exploitation allows e.g. downloading and executing malicious programs, but requires that the application connects to a malicious update server providing a specially crafted X.509 certificate (e.g. via DNS poisoning).

The security issue is reported in version 3.13.0005. Other versions may also be affected.

Do you have this product installed on your home computer? Scan using the free Personal Software Inspector. Check if a vulnerable version is installed on computers in your corporate network, scan using the Network Software Inspector.

Solution:
Update to version 3.14.
http://www-307.ibm.com/pc/support/sit...testyle=lenovo&lndocid=MIGR-66956

Provided and/or discovered by:
Derek Callaway, Security Objectives

Original Advisory:
SECOBJADV-2008-01:
http://www.security-objectives.com/advisories/SECOBJADV-2008-01.txt



Please note: The information that this Secunia Advisory is based on comes from a third party unless stated otherwise.

Secunia collects, validates, and verifies all vulnerability reports issued by security research groups, vendors, and others.


Send Feedback to Secunia

If you have new information regarding this Secunia advisory or a product in our database, please send it to us using either our web form or email us at vuln@secunia.com.

Ideas, suggestions, and other feedback are most welcome.








Secunia PSI
Scan | Patch | Track
Free Download

Secunia Poll

Do you think it's important to read Setup/User Guides for applications for use within your network?


See Results   


Most Popular Advisories

1.
ThinkVantage System Update Missing SSL Certificate Chain Verification
2.
Mambo Multiple Vulnerabilities
3.
phpRaider "pConfig_auth[p hpbb_path]" File Inclusion
4.
Debian update for mtr
5.
Starsgames Control Panel "st" Cross-Site Scripting
6.
Core FTP Directory Download Directory Traversal Vulnerability
7.
OneCMS "load" Local File Inclusion Vulnerability
8.
Sun Java System Web Server Advanced Search Cross-Site Scripting
9.
eMule Plus "staticservers. dat" Unspecified Vulnerability
10.
encrypt Anubis Plugin Original File Size Weakness





Vulnerability Management - Terms & Conditions - Copyright 2002-2008 Secunia - Compliance - Contact Secunia