Описание
org.apache.http.conn.ssl.AbstractVerifier in Apache HttpComponents HttpClient before 4.3.5 and HttpAsyncClient before 4.0.2 does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a "CN=" string in a field in the distinguished name (DN) of a certificate, as demonstrated by the "foo,CN=www.apache.org" string in the O field.
Релиз | Статус | Примечание |
---|---|---|
artful | not-affected | 3.1-11 |
bionic | not-affected | 3.1-11 |
devel | not-affected | 3.1-11 |
esm-apps/bionic | not-affected | 3.1-11 |
esm-apps/xenial | not-affected | 3.1-11 |
esm-infra-legacy/trusty | released | 3.1-10.2ubuntu0.14.04.1 |
precise | released | 3.1-10ubuntu0.1 |
precise/esm | DNE | precise was released [3.1-10ubuntu0.1] |
trusty | released | 3.1-10.2ubuntu0.14.04.1 |
trusty/esm | released | 3.1-10.2ubuntu0.14.04.1 |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
artful | not-affected | 4.4.1-1 |
bionic | not-affected | 4.4.1-1 |
devel | not-affected | 4.4.1-1 |
esm-apps/bionic | not-affected | 4.4.1-1 |
esm-apps/xenial | not-affected | 4.4.1-1 |
esm-infra-legacy/trusty | released | 4.3.3-1ubuntu0.1 |
lucid | DNE | |
precise | ignored | end of life |
precise/esm | DNE | precise was needed |
trusty | released | 4.3.3-1ubuntu0.1 |
Показывать по
EPSS
5.8 Medium
CVSS2
Связанные уязвимости
org.apache.http.conn.ssl.AbstractVerifier in Apache HttpComponents HttpClient before 4.3.5 and HttpAsyncClient before 4.0.2 does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a "CN=" string in a field in the distinguished name (DN) of a certificate, as demonstrated by the "foo,CN=www.apache.org" string in the O field.
org.apache.http.conn.ssl.AbstractVerifier in Apache HttpComponents HttpClient before 4.3.5 and HttpAsyncClient before 4.0.2 does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a "CN=" string in a field in the distinguished name (DN) of a certificate, as demonstrated by the "foo,CN=www.apache.org" string in the O field.
org.apache.http.conn.ssl.AbstractVerifier in Apache HttpComponents Htt ...
Improper Verification of Cryptographic Signature in org.apache.httpcomponents:httpclient
ELSA-2014-1166: jakarta-commons-httpclient security update (IMPORTANT)
EPSS
5.8 Medium
CVSS2