Описание
Improper Certificate Validation in vt-ldap
DefaultHostnameVerifier in Ldaptive (formerly vt-ldap) does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2014-3607
- https://bugzilla.redhat.com/show_bug.cgi?id=1140438
- https://code.google.com/archive/p/vt-middleware/issues/226
- https://code.google.com/archive/p/vt-middleware/issues/227
- https://code.google.com/archive/p/vt-middleware/issues/228
- https://code.google.com/archive/p/vt-middleware/source/default/commits
- https://code.google.com/p/vt-middleware/source/detail?r=3046
- http://shibboleth.net/community/advisories/secadv_20140919.txt
Пакеты
edu.vt.middleware:vt-ldap
< 3.3.8
3.3.8
edu.internet2.middleware:shibboleth-identityprovider
< 2.4.2
2.4.2
Связанные уязвимости
DefaultHostnameVerifier in Ldaptive (formerly vt-ldap) does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
DefaultHostnameVerifier in Ldaptive (formerly vt-ldap) does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
DefaultHostnameVerifier in Ldaptive (formerly vt-ldap) does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
DefaultHostnameVerifier in Ldaptive (formerly vt-ldap) does not proper ...