Описание
The (1) serf_ssl_cert_issuer, (2) serf_ssl_cert_subject, and (3) serf_ssl_cert_certificate functions in Serf 0.2.0 through 1.3.x before 1.3.7 does not properly handle a NUL byte in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 1.3.7-1 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was released [1.3.3-1ubuntu0.1]] |
| lucid | ignored | end of life |
| precise | released | 1.0.0-2ubuntu0.1 |
| trusty | released | 1.3.3-1ubuntu0.1 |
| trusty/esm | DNE | trusty was released [1.3.3-1ubuntu0.1] |
| upstream | released | 1.3.7 |
Показывать по
4 Medium
CVSS2
Связанные уязвимости
The (1) serf_ssl_cert_issuer, (2) serf_ssl_cert_subject, and (3) serf_ssl_cert_certificate functions in Serf 0.2.0 through 1.3.x before 1.3.7 does not properly handle a NUL byte in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.
The (1) serf_ssl_cert_issuer, (2) serf_ssl_cert_subject, and (3) serf_ ...
The (1) serf_ssl_cert_issuer, (2) serf_ssl_cert_subject, and (3) serf_ssl_cert_certificate functions in Serf 0.2.0 through 1.3.x before 1.3.7 does not properly handle a NUL byte in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.
4 Medium
CVSS2