TROYANOSYVIRUS
Volver a CVEs

CVE-2014-3596

N/A

Descripcion

The getCN function in Apache Axis 1.4 and earlier does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a certificate with a subject that specifies a common name in a field that is not the CN field. NOTE: this issue exists because of an incomplete fix for CVE-2012-5784.

Detalles CVE

Puntuacion CVSS v3.1N/A
Publicado8/27/2014
Ultima modificacion4/12/2025
Fuentenvd
Avistamientos honeypot0

Productos afectados

apache:axis

Referencias

http://linux.oracle.com/errata/ELSA-2014-1193.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2014-1193.html(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/61222(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2014/08/20/2(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/69295(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1030745(af854a3a-2127-422b-91ae-364da2661108)
https://issues.apache.org/jira/browse/AXIS-2905(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpujan2020.html(af854a3a-2127-422b-91ae-364da2661108)

Correlaciones IOC

Sin correlaciones registradas

This product uses data from the NVD API but is not endorsed or certified by the NVD.