Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2013-7449

Опубликовано: 21 апр. 2016
Источник: debian
EPSS Низкий

Описание

The ssl_do_connect function in common/server.c in HexChat before 2.10.2, XChat, and XChat-GNOME does not verify that the server hostname matches a domain name in the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
xchatfixed2.8.8-10package
xchatno-dsajessiepackage
xchatno-dsawheezypackage
xchatno-dsasqueezepackage
xchat-gnomeremovedpackage
xchat-gnomeno-dsawheezypackage
xchat-gnomeno-dsasqueezepackage
hexchatfixed2.10.2-1package
hexchatfixed2.10.1-1+deb8u1jessiepackage

Примечания

  • https://github.com/hexchat/hexchat/issues/524

  • https://github.com/hexchat/hexchat/commit/c9b63f7f9be01692b03fa15275135a4910a7e02d (v2.12.0)

  • https://github.com/hexchat/hexchat/commit/c99f2ba645d1f4d01d6d2bb0cc1238825e15c604 (v2.10.2)

EPSS

Процентиль: 36%
0.00149
Низкий

Связанные уязвимости

CVSS3: 6.5
ubuntu
почти 10 лет назад

The ssl_do_connect function in common/server.c in HexChat before 2.10.2, XChat, and XChat-GNOME does not verify that the server hostname matches a domain name in the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.

redhat
около 11 лет назад

The ssl_do_connect function in common/server.c in HexChat before 2.10.2, XChat, and XChat-GNOME does not verify that the server hostname matches a domain name in the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.

CVSS3: 6.5
nvd
почти 10 лет назад

The ssl_do_connect function in common/server.c in HexChat before 2.10.2, XChat, and XChat-GNOME does not verify that the server hostname matches a domain name in the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.

CVSS3: 6.5
github
больше 3 лет назад

The ssl_do_connect function in common/server.c in HexChat before 2.10.2, XChat, and XChat-GNOME does not verify that the server hostname matches a domain name in the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.

EPSS

Процентиль: 36%
0.00149
Низкий