[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96174

 
 

909

 
 

78077

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2014-3596

Date: (C)2014-08-28   (M)2017-08-29
 
CVSS Score: 5.8Access Vector: NETWORK
Exploitability Subscore: 8.6Access Complexity: MEDIUM
Impact Subscore: 4.9Authentication: NONE
 Confidentiality: PARTIAL
 Integrity: PARTIAL
 Availability: NONE











The getCN function in Apache Axis 1.4 and earlier does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a certificate with a subject that specifies a common name in a field that is not the CN field. NOTE: this issue exists because of an incomplete fix for CVE-2012-5784.

Reference:
SECTRACK-1030745
SECUNIA-61222
BID-69295
RHSA-2014:1193
http://www.openwall.com/lists/oss-security/2014/08/20/2
apache-axis-cve20143596-spoofing(95377)
http://linux.oracle.com/errata/ELSA-2014-1193.html
https://issues.apache.org/jira/browse/AXIS-2905

CPE    19
cpe:/a:apache:axis:1.0:rc1
cpe:/a:apache:axis:1.0:rc2
cpe:/a:apache:axis:1.1
cpe:/a:apache:axis:1.0
...
OVAL    6
oval:org.secpod.oval:def:1500717
oval:org.secpod.oval:def:203425
oval:org.secpod.oval:def:203424
oval:org.secpod.oval:def:1500707
...

© 2013 SecPod Technologies