[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

Spoofing vulnerability in the X.509 certificate in Trillian via an arbitrary valid certificate

ID: oval:org.secpod.oval:def:7792Date: (C)2012-11-06   (M)2022-10-10
Class: VULNERABILITYFamily: windows




The host is installed with Trillian 5.1.0.19 and is prone to spoofing vulnerability. A flaw is present in the application, which fails to verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate. Successful exploitation could allow man-in-the-middle attackers to spoof SSL servers.

Platform:
Microsoft Windows 11
Microsoft Windows Server 2022
Microsoft Windows Server 2019
Microsoft Windows 2000
Microsoft Windows 7
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Vista
Microsoft Windows 8
Microsoft Windows 8.1
Microsoft Windows Server 2012
Microsoft Windows Server 2012 R2
Microsoft Windows XP
Microsoft Windows 10
Microsoft Windows Server 2016
Product:
Trillian
Reference:
CVE-2012-5824
CVE    1
CVE-2012-5824
CPE    2
cpe:/a:trillian:trillian:::x86
cpe:/a:trillian:trillian:5.1.0.19

© SecPod Technologies