Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2009-3766

Опубликовано: 10 авг. 2009
Источник: redhat
CVSS2: 5.8
EPSS Низкий

Описание

mutt_ssl.c in mutt 1.5.16 and other versions before 1.5.19, when OpenSSL is used, does not verify the domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 4muttWill not fix
Red Hat Enterprise Linux 5muttWill not fix

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-297
https://bugzilla.redhat.com/show_bug.cgi?id=531011mutt: missing host name vs. SSL certificate name checks

EPSS

Процентиль: 80%
0.01392
Низкий

5.8 Medium

CVSS2

Связанные уязвимости

ubuntu
около 16 лет назад

mutt_ssl.c in mutt 1.5.16 and other versions before 1.5.19, when OpenSSL is used, does not verify the domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.

nvd
около 16 лет назад

mutt_ssl.c in mutt 1.5.16 and other versions before 1.5.19, when OpenSSL is used, does not verify the domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.

debian
около 16 лет назад

mutt_ssl.c in mutt 1.5.16 and other versions before 1.5.19, when OpenS ...

github
больше 3 лет назад

mutt_ssl.c in mutt 1.5.16 and other versions before 1.5.19, when OpenSSL is used, does not verify the domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.

EPSS

Процентиль: 80%
0.01392
Низкий

5.8 Medium

CVSS2

Уязвимость CVE-2009-3766