Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2009-2474

Опубликовано: 21 авг. 2009
Источник: debian
EPSS Низкий

Описание

neon before 0.28.6, when OpenSSL or GnuTLS is used, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
neon27fixed0.28.6-1package
neon27no-dsalennypackage
neon26fixed0.26.4-3package
neon26no-dsalennypackage
neonremovedpackage
neonno-dsaetchpackage
gnome-vfs2removedpackage
litmusfixed0.13-1package

Примечания

  • affected neon code copy present in gnome-vfs2 [./imported/*]

  • affected neon code copy present in litmus [./libneon/*]

  • The new reintroduced litmus package removes the embedded copy

EPSS

Процентиль: 61%
0.00426
Низкий

Связанные уязвимости

ubuntu
почти 16 лет назад

neon before 0.28.6, when OpenSSL or GnuTLS is used, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.

redhat
почти 16 лет назад

neon before 0.28.6, when OpenSSL or GnuTLS is used, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.

nvd
почти 16 лет назад

neon before 0.28.6, when OpenSSL or GnuTLS is used, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.

github
около 3 лет назад

neon before 0.28.6, when OpenSSL or GnuTLS is used, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.

oracle-oval
почти 16 лет назад

ELSA-2009-1452: neon security update (MODERATE)

EPSS

Процентиль: 61%
0.00426
Низкий