Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2011-4318

Опубликовано: 17 нояб. 2011
Источник: redhat
CVSS2: 5.8
EPSS Низкий

Описание

Dovecot 2.0.x before 2.0.16, when ssl or starttls is enabled and hostname is used to define the proxy destination, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a valid certificate for a different hostname.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 4dovecotNot affected
Red Hat Enterprise Linux 5dovecotNot affected
Red Hat Enterprise Linux 6dovecotFixedRHSA-2013:052020.02.2013

Показывать по

Дополнительная информация

Статус:

Low
https://bugzilla.redhat.com/show_bug.cgi?id=754980dovecot: proxy destination host name not checked against SSL certificate name

EPSS

Процентиль: 66%
0.0052
Низкий

5.8 Medium

CVSS2

Связанные уязвимости

ubuntu
больше 12 лет назад

Dovecot 2.0.x before 2.0.16, when ssl or starttls is enabled and hostname is used to define the proxy destination, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a valid certificate for a different hostname.

nvd
больше 12 лет назад

Dovecot 2.0.x before 2.0.16, when ssl or starttls is enabled and hostname is used to define the proxy destination, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a valid certificate for a different hostname.

debian
больше 12 лет назад

Dovecot 2.0.x before 2.0.16, when ssl or starttls is enabled and hostn ...

github
больше 3 лет назад

Dovecot 2.0.x before 2.0.16, when ssl or starttls is enabled and hostname is used to define the proxy destination, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a valid certificate for a different hostname.

oracle-oval
больше 12 лет назад

ELSA-2013-0520: dovecot security and bug fix update (LOW)

EPSS

Процентиль: 66%
0.0052
Низкий

5.8 Medium

CVSS2