Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2014-3577

Опубликовано: 21 авг. 2014
Источник: debian
EPSS Низкий

Описание

org.apache.http.conn.ssl.AbstractVerifier in Apache HttpComponents HttpClient before 4.3.5 and HttpAsyncClient before 4.0.2 does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a "CN=" string in a field in the distinguished name (DN) of a certificate, as demonstrated by the "foo,CN=www.apache.org" string in the O field.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
httpcomponents-clientfixed4.3.5-1package
httpcomponents-clientfixed4.1.1-2+deb7u1wheezypackage
httpcomponents-clientno-dsasqueezepackage
commons-httpclientfixed3.1-11package
commons-httpclientfixed3.1-10.2+deb7u1wheezypackage

Примечания

  • See https://bugs.debian.org/758086#59 for full details.

EPSS

Процентиль: 79%
0.01367
Низкий

Связанные уязвимости

ubuntu
около 11 лет назад

org.apache.http.conn.ssl.AbstractVerifier in Apache HttpComponents HttpClient before 4.3.5 and HttpAsyncClient before 4.0.2 does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a "CN=" string in a field in the distinguished name (DN) of a certificate, as demonstrated by the "foo,CN=www.apache.org" string in the O field.

CVSS3: 4.8
redhat
около 11 лет назад

org.apache.http.conn.ssl.AbstractVerifier in Apache HttpComponents HttpClient before 4.3.5 and HttpAsyncClient before 4.0.2 does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a "CN=" string in a field in the distinguished name (DN) of a certificate, as demonstrated by the "foo,CN=www.apache.org" string in the O field.

nvd
около 11 лет назад

org.apache.http.conn.ssl.AbstractVerifier in Apache HttpComponents HttpClient before 4.3.5 and HttpAsyncClient before 4.0.2 does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a "CN=" string in a field in the distinguished name (DN) of a certificate, as demonstrated by the "foo,CN=www.apache.org" string in the O field.

github
почти 7 лет назад

Improper Verification of Cryptographic Signature in org.apache.httpcomponents:httpclient

oracle-oval
почти 11 лет назад

ELSA-2014-1166: jakarta-commons-httpclient security update (IMPORTANT)

EPSS

Процентиль: 79%
0.01367
Низкий