[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250038

 
 

909

 
 

195843

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-1943 openldap openldap2.3 -- insufficient input validation

ID: oval:org.mitre.oval:def:7899Date: (C)2009-12-15   (M)2024-01-23
Class: PATCHFamily: unix




It was discovered that OpenLDAP, a free implementation of the Lightweight Directory Access Protocol, when OpenSSL is used, does not properly handle a "\0" character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.

Platform:
Debian 5.0
Debian 4.0
Product:
openldap
openldap2.3
Reference:
DSA-1943
CVE-2009-3767
CVE    1
CVE-2009-3767
CPE    2
cpe:/o:debian:debian_linux:4.x
cpe:/o:debian:debian_linux:5.x

© SecPod Technologies