Computer Security
[EN] securityvulns.ru no-pyccku


libneon certificate spoofing
Published:25.08.2009
Source:
SecurityVulns ID:10183
Type:library
Threat Level:
5/10
Description:Invalid NULL character processing in CN field.
CVE:CVE-2009-2474 (neon before 0.28.6, when OpenSSL or GnuTLS is used, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.)
 CVE-2009-2473 (neon before 0.28.6, when expat is used, does not properly detect recursion during entity expansion, which allows context-dependent attackers to cause a denial of service (memory and CPU consumption) via a crafted XML document containing a large number of nested entity references, a similar issue to CVE-2003-1564.)
Original documentdocumentMANDRIVA, [ MDVSA-2009:221 ] libneon0.27 (25.08.2009)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod