Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2009-2474

Опубликовано: 21 авг. 2009
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 5.8

Описание

neon before 0.28.6, when OpenSSL or GnuTLS is used, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.

РелизСтатусПримечание
dapper

released

0.25.5.dfsg-5ubuntu0.1
devel

DNE

hardy

DNE

intrepid

DNE

jaunty

DNE

karmic

DNE

lucid

DNE

maverick

DNE

natty

DNE

oneiric

DNE

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

DNE

pulled 2010-07-27
hardy

ignored

end of life
intrepid

ignored

end of life, was needed
jaunty

ignored

end of life
karmic

ignored

end of life
lucid

ignored

end of life
maverick

DNE

pulled 2010-07-27
natty

DNE

pulled 2010-07-27
oneiric

DNE

pulled 2010-07-27

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

not-affected

hardy

released

0.27.2-1ubuntu0.1
intrepid

released

0.28.2-2ubuntu0.1
jaunty

released

0.28.2-6.1ubuntu0.1
karmic

not-affected

lucid

not-affected

maverick

not-affected

natty

not-affected

oneiric

not-affected

Показывать по

EPSS

Процентиль: 61%
0.00426
Низкий

5.8 Medium

CVSS2

Связанные уязвимости

redhat
около 16 лет назад

neon before 0.28.6, when OpenSSL or GnuTLS is used, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.

nvd
около 16 лет назад

neon before 0.28.6, when OpenSSL or GnuTLS is used, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.

debian
около 16 лет назад

neon before 0.28.6, when OpenSSL or GnuTLS is used, does not properly ...

github
больше 3 лет назад

neon before 0.28.6, when OpenSSL or GnuTLS is used, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.

oracle-oval
почти 16 лет назад

ELSA-2009-1452: neon security update (MODERATE)

EPSS

Процентиль: 61%
0.00426
Низкий

5.8 Medium

CVSS2