Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2015-3008

Опубликовано: 10 апр. 2015
Источник: ubuntu
Приоритет: medium
CVSS2: 4.3

Описание

Asterisk Open Source 1.8 before 1.8.32.3, 11.x before 11.17.1, 12.x before 12.8.2, and 13.x before 13.3.2 and Certified Asterisk 1.8.28 before 1.8.28-cert5, 11.6 before 11.6-cert11, and 13.1 before 13.1-cert2, when registering a SIP TLS device, does not properly handle a null byte in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.

РелизСтатусПримечание
artful

ignored

end of life
bionic

not-affected

1:13.18.3~dfsg-1ubuntu4
cosmic

not-affected

1:13.20.0~dfsg-1
devel

not-affected

1:13.20.0~dfsg-1
disco

not-affected

1:13.20.0~dfsg-1
eoan

not-affected

1:13.20.0~dfsg-1
esm-apps/bionic

not-affected

1:13.18.3~dfsg-1ubuntu4
esm-apps/focal

not-affected

1:13.20.0~dfsg-1
esm-apps/jammy

not-affected

1:13.20.0~dfsg-1
esm-apps/noble

not-affected

1:13.20.0~dfsg-1

Показывать по

4.3 Medium

CVSS2

Связанные уязвимости

nvd
почти 11 лет назад

Asterisk Open Source 1.8 before 1.8.32.3, 11.x before 11.17.1, 12.x before 12.8.2, and 13.x before 13.3.2 and Certified Asterisk 1.8.28 before 1.8.28-cert5, 11.6 before 11.6-cert11, and 13.1 before 13.1-cert2, when registering a SIP TLS device, does not properly handle a null byte in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.

debian
почти 11 лет назад

Asterisk Open Source 1.8 before 1.8.32.3, 11.x before 11.17.1, 12.x be ...

github
больше 3 лет назад

Asterisk Open Source 1.8 before 1.8.32.3, 11.x before 11.17.1, 12.x before 12.8.2, and 13.x before 13.3.2 and Certified Asterisk 1.8.28 before 1.8.28-cert5, 11.6 before 11.6-cert11, and 13.1 before 13.1-cert2, when registering a SIP TLS device, does not properly handle a null byte in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.

4.3 Medium

CVSS2