Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2012-6153

Опубликовано: 04 сент. 2014
Источник: ubuntu
Приоритет: low
CVSS2: 4.3

Описание

http/conn/ssl/AbstractVerifier.java in Apache Commons HttpClient before 4.2.3 does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a certificate with a subject that specifies a common name in a field that is not the CN field. NOTE: this issue exists because of an incomplete fix for CVE-2012-5783.

РелизСтатусПримечание
devel

not-affected

3.1-10.2
esm-apps/xenial

not-affected

3.1-10.2
esm-infra-legacy/trusty

not-affected

3.1-10.2
lucid

ignored

end of life
precise

released

3.1-10ubuntu0.1
precise/esm

DNE

precise was released [3.1-10ubuntu0.1]
trusty

not-affected

3.1-10.2
trusty/esm

not-affected

3.1-10.2
upstream

released

3.1-10.2
utopic

not-affected

3.1-10.2

Показывать по

РелизСтатусПримечание
devel

not-affected

4.4.1-1
esm-apps/xenial

not-affected

4.4.1-1
esm-infra-legacy/trusty

not-affected

4.3.3-1
precise

ignored

end of life
precise/esm

DNE

precise was needed
trusty

not-affected

4.3.3-1
trusty/esm

not-affected

4.3.3-1
upstream

needs-triage

vivid

not-affected

4.3.5-2
vivid/stable-phone-overlay

DNE

Показывать по

4.3 Medium

CVSS2

Связанные уязвимости

redhat
больше 11 лет назад

http/conn/ssl/AbstractVerifier.java in Apache Commons HttpClient before 4.2.3 does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a certificate with a subject that specifies a common name in a field that is not the CN field. NOTE: this issue exists because of an incomplete fix for CVE-2012-5783.

nvd
больше 11 лет назад

http/conn/ssl/AbstractVerifier.java in Apache Commons HttpClient before 4.2.3 does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a certificate with a subject that specifies a common name in a field that is not the CN field. NOTE: this issue exists because of an incomplete fix for CVE-2012-5783.

debian
больше 11 лет назад

http/conn/ssl/AbstractVerifier.java in Apache Commons HttpClient befor ...

github
больше 7 лет назад

Improper certificate validation in org.apache.httpcomponents:httpclient

CVSS3: 5.3
fstec
около 13 лет назад

Уязвимость библиотеки клиентского модуля Apache HttpClient средства Apache HttpComponents, позволяющая нарушителю подменить SSL-серверы

4.3 Medium

CVSS2

Уязвимость CVE-2012-6153