Информационная безопасность
[RU] switch to English


Обход проверки сертификата в serf / Apache httpcomponents HttpClient / Jakarta Commons HttpClient
Опубликовано:15 октября 2014 г.
Источник:
SecurityVulns ID:14026
Тип:библиотека
Уровень опасности:
5/10
Описание:Некорректно разбираются сертификаты с нулевым символом.
Затронутые продукты:SERF : Serf 1.3
CVE:CVE-2014-3504 (The (1) serf_ssl_cert_issuer, (2) serf_ssl_cert_subject, and (3) serf_ssl_cert_certificate functions in Serf 0.2.0 through 1.3.x before 1.3.7 does not properly handle a NUL byte in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.)
 CVE-2012-6153 (http/conn/ssl/AbstractVerifier.java in Apache Commons HttpClient before 4.2.3 does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a certificate with a subject that specifies a common name in a field that is not the CN field. NOTE: this issue exists because of an incomplete fix for CVE-2012-5783.)
Оригинальный текстdocumentMANDRIVA, [ MDVSA-2014:170 ] jakarta-commons-httpclient (15.10.2014)

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород