Уязвимость подмены SSL-серверов через манипуляцию X.509 сертификатами в GNU Wget до версии 1.12
Описание
В версиях GNU Wget до 1.12 некорректно обрабатывается символ \0
в имени домена, указанном в поле Common Name X.509 сертификата. Это позволяет злоумышленнику, используя атаку "человек посередине" (MiTM), подменить SSL-серверы с помощью поддельного сертификата, выданного легитимным центром сертификации.
Затронутые версии ПО
- GNU Wget версии до 1.12
Тип уязвимости
- Подмена (спуфинг) SSL-серверов
Ссылки
- Vendor Advisory
- Vendor Advisory
- Vendor Advisory
- Vendor Advisory
Уязвимые конфигурации
Одно из
EPSS
6.8 Medium
CVSS2
Дефекты
Связанные уязвимости
GNU Wget before 1.12 does not properly handle a '\0' character in a domain name in the Common Name field of an X.509 certificate, which allows man-in-the-middle remote attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
GNU Wget before 1.12 does not properly handle a '\0' character in a domain name in the Common Name field of an X.509 certificate, which allows man-in-the-middle remote attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
GNU Wget before 1.12 does not properly handle a '\0' character in a do ...
GNU Wget before 1.12 does not properly handle a '\0' character in a domain name in the Common Name field of an X.509 certificate, which allows man-in-the-middle remote attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
EPSS
6.8 Medium
CVSS2