Описание
The Python client in Apache Qpid before 2.2 does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat CloudForms Tools 1 | python-qpid | Will not fix | ||
| Red Hat Enterprise Linux 6 | python-qpid | Will not fix | ||
| Red Hat Satellite 6 | python-qpid | Not affected | ||
| Red Hat Enterprise MRG 2 | python-qpid | Fixed | RHSA-2013:1024 | 11.07.2013 |
| Red Hat Enterprise MRG 2 | qpid-cpp | Fixed | RHSA-2013:1024 | 11.07.2013 |
| Red Hat Enterprise MRG 2 | qpid-java | Fixed | RHSA-2013:1024 | 11.07.2013 |
| Red Hat Enterprise MRG 2 | qpid-qmf | Fixed | RHSA-2013:1024 | 11.07.2013 |
| Red Hat Enterprise MRG 2 | qpid-tools | Fixed | RHSA-2013:1024 | 11.07.2013 |
Показывать по
Дополнительная информация
Статус:
EPSS
4.3 Medium
CVSS2
Связанные уязвимости
The Python client in Apache Qpid before 2.2 does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
The Python client in Apache Qpid before 2.2 does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
The Python client in Apache Qpid before 2.2 does not verify that the s ...
Apache Qpid Python client Improper certificate validation
EPSS
4.3 Medium
CVSS2