Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2012-5583

Опубликовано: 06 июн. 2014
Источник: debian

Описание

phpCAS before 1.3.2 does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
php-casfixed1.3.1-2package
moodlefixed2.2.7.dfsg-1package
moodleno-dsasqueezepackage
moodlefixed2.2.3.dfsg-2.6~wheezy1wheezypackage

Примечания

  • https://github.com/Jasig/phpCAS/pull/58

Связанные уязвимости

nvd
больше 11 лет назад

phpCAS before 1.3.2 does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.

github
больше 3 лет назад

phpCAS before 1.3.2 does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.