[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248364

 
 

909

 
 

195388

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2014-3504Date: (C)2014-08-22   (M)2023-12-22


The (1) serf_ssl_cert_issuer, (2) serf_ssl_cert_subject, and (3) serf_ssl_cert_certificate functions in Serf 0.2.0 through 1.3.x before 1.3.7 does not properly handle a NUL byte in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 4.0
Exploit Score: 4.9
Impact Score: 4.9
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: HIGH
Authentication: NONE
Confidentiality: PARTIAL
Integrity: PARTIAL
Availability: NONE
  
Reference:
SECUNIA-59584
SECUNIA-60721
BID-69238
GLSA-201610-05
USN-2315-1
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
https://groups.google.com/forum/#%21topic/serf-dev/NvgPoK6sFsc
https://subversion.apache.org/security/CVE-2014-3522-advisory.txt
openSUSE-SU-2014:1059

CPE    94
cpe:/a:serf_project:serf:1.0.3
cpe:/a:serf_project:serf:1.0.0
cpe:/a:apache:subversion:1.4.0
cpe:/a:serf_project:serf:1.0.1
...
OVAL    4
oval:org.secpod.oval:def:702152
oval:org.secpod.oval:def:1600031
oval:org.secpod.oval:def:52273
oval:org.secpod.oval:def:107377
...

© SecPod Technologies