Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2011-4318

Опубликовано: 17 нояб. 2011
Источник: redhat
CVSS2: 5.8

Описание

Dovecot 2.0.x before 2.0.16, when ssl or starttls is enabled and hostname is used to define the proxy destination, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a valid certificate for a different hostname.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 4dovecotNot affected
Red Hat Enterprise Linux 5dovecotNot affected
Red Hat Enterprise Linux 6dovecotFixedRHSA-2013:052020.02.2013

Показывать по

Дополнительная информация

Статус:

Low
https://bugzilla.redhat.com/show_bug.cgi?id=754980dovecot: proxy destination host name not checked against SSL certificate name

5.8 Medium

CVSS2

Связанные уязвимости

ubuntu
около 13 лет назад

Dovecot 2.0.x before 2.0.16, when ssl or starttls is enabled and hostname is used to define the proxy destination, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a valid certificate for a different hostname.

nvd
около 13 лет назад

Dovecot 2.0.x before 2.0.16, when ssl or starttls is enabled and hostname is used to define the proxy destination, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a valid certificate for a different hostname.

debian
около 13 лет назад

Dovecot 2.0.x before 2.0.16, when ssl or starttls is enabled and hostn ...

github
почти 4 года назад

Dovecot 2.0.x before 2.0.16, when ssl or starttls is enabled and hostname is used to define the proxy destination, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a valid certificate for a different hostname.

oracle-oval
около 13 лет назад

ELSA-2013-0520: dovecot security and bug fix update (LOW)

5.8 Medium

CVSS2