Computer Security
[EN] securityvulns.ru no-pyccku


serf / Apache httpcomponents HttpClient / Jakarta Commons HttpClient SSL validation bypass
Published:15.10.2014
Source:
SecurityVulns ID:14026
Type:library
Threat Level:
5/10
Description:Invalid parsing of certificates with NUL character in CN.
Affected:SERF : Serf 1.3
CVE:CVE-2014-3504 (The (1) serf_ssl_cert_issuer, (2) serf_ssl_cert_subject, and (3) serf_ssl_cert_certificate functions in Serf 0.2.0 through 1.3.x before 1.3.7 does not properly handle a NUL byte in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.)
 CVE-2012-6153 (http/conn/ssl/AbstractVerifier.java in Apache Commons HttpClient before 4.2.3 does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a certificate with a subject that specifies a common name in a field that is not the CN field. NOTE: this issue exists because of an incomplete fix for CVE-2012-5783.)
Original documentdocumentMANDRIVA, [ MDVSA-2014:170 ] jakarta-commons-httpclient (15.10.2014)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod