All the vulnerabilites related to serf_project - serf
Vulnerability from fkie_nvd
Published
2014-08-19 18:55
Modified
2024-11-21 02:08
Severity ?
Summary
The (1) serf_ssl_cert_issuer, (2) serf_ssl_cert_subject, and (3) serf_ssl_cert_certificate functions in Serf 0.2.0 through 1.3.x before 1.3.7 does not properly handle a NUL byte in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.
Impacted products
Vendor Product Version
apache subversion 1.4.0
apache subversion 1.4.1
apache subversion 1.4.2
apache subversion 1.4.3
apache subversion 1.4.4
apache subversion 1.4.5
apache subversion 1.4.6
apache subversion 1.5.0
apache subversion 1.5.1
apache subversion 1.5.2
apache subversion 1.5.3
apache subversion 1.5.4
apache subversion 1.5.5
apache subversion 1.5.6
apache subversion 1.5.7
apache subversion 1.5.8
apache subversion 1.6.0
apache subversion 1.6.1
apache subversion 1.6.2
apache subversion 1.6.3
apache subversion 1.6.4
apache subversion 1.6.5
apache subversion 1.6.6
apache subversion 1.6.7
apache subversion 1.6.8
apache subversion 1.6.9
apache subversion 1.6.10
apache subversion 1.6.11
apache subversion 1.6.12
apache subversion 1.6.13
apache subversion 1.6.14
apache subversion 1.6.15
apache subversion 1.6.16
apache subversion 1.6.17
apache subversion 1.6.18
apache subversion 1.6.19
apache subversion 1.6.20
apache subversion 1.6.21
apache subversion 1.6.23
apache subversion 1.7.0
apache subversion 1.7.1
apache subversion 1.7.2
apache subversion 1.7.3
apache subversion 1.7.4
apache subversion 1.7.5
apache subversion 1.7.6
apache subversion 1.7.7
apache subversion 1.7.8
apache subversion 1.7.9
apache subversion 1.7.10
apache subversion 1.7.11
apache subversion 1.7.12
apache subversion 1.7.13
apache subversion 1.7.14
apache subversion 1.7.15
apache subversion 1.7.16
apache subversion 1.7.17
apache subversion 1.8.0
apache subversion 1.8.1
apache subversion 1.8.2
apache subversion 1.8.3
apache subversion 1.8.4
apache subversion 1.8.5
apache subversion 1.8.6
apache subversion 1.8.7
apache subversion 1.8.8
apache subversion 1.8.9
canonical ubuntu_linux 12.04
canonical ubuntu_linux 14.04
serf_project serf 0.2.0
serf_project serf 0.3.0
serf_project serf 0.3.1
serf_project serf 0.4.0
serf_project serf 0.5.0
serf_project serf 0.6.0
serf_project serf 0.6.1
serf_project serf 0.7.0
serf_project serf 0.7.1
serf_project serf 0.7.2
serf_project serf 1.0.0
serf_project serf 1.0.1
serf_project serf 1.0.2
serf_project serf 1.0.3
serf_project serf 1.1.0
serf_project serf 1.1.1
serf_project serf 1.2.0
serf_project serf 1.2.1
serf_project serf 1.3.0
serf_project serf 1.3.1
serf_project serf 1.3.2
serf_project serf 1.3.3
serf_project serf 1.3.4
serf_project serf 1.3.5
serf_project serf 1.3.6



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "13109084-931E-4565-BEE5-794B83E6978D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4ED3EA46-88F7-438D-B8FC-D6C5E1C8984C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "726B9C10-ACD5-41C2-A552-FD0046A75966",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "87D72A75-EDB9-4AD1-B6FC-8A918804DE0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B55A7A26-C994-4956-BBE7-BF3A51971295",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB9E26AB-915A-477F-BA5C-10965A7098F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFD49A9B-16A7-4362-8D62-6EB5ECBE4296",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B0CB798-F4ED-44E5-9B15-B7009EAC6303",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC3F6E5C-CF55-4CEB-A5B6-D49E0234FF3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2C1DD29-88D2-49DE-9B77-D925A4B9EB7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "67130DAF-AE81-43D2-A208-58A53746A7E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB9F8426-38CB-46B4-B0D0-8D16B48DD53F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "90631FFA-9AB2-483D-B162-31A47428D280",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BD5A981-3FDD-4E74-8EB2-5F324246FFF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "88F4E8C9-671B-4DA3-9D0D-98539D8D4FE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.5.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "341F900B-5179-4CB4-9F41-91B58B29C414",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F34F463-6350-4F48-B037-856DDBB1A4FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2C813BA-B8F9-446B-A07F-B51F26815578",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DF4080D-0D95-429E-88AA-1051A5520C01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF50F098-A055-4B79-AC35-6BD6F32D70F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "540461D4-87F4-42AB-ADDC-C7A067FE2893",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E676744-C623-4894-8764-43588E56D2FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "669735D1-1C14-4CD7-AA7C-AD2CA63A1979",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4C568FD-54BC-4506-AF60-BFE7CE14D0F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5F71F24-D909-49D9-8B4F-FA757FDF1C25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.6.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "034D1C36-B73E-443E-A6B4-44CC6E7BC043",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.6.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D373245-8384-45E4-BE2E-E0518BD7F84F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.6.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "EED44413-D313-4588-9A4B-25F79D0925A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.6.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "C193EB08-BBC2-43A2-B11A-9C7E2098862D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.6.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "022A5BCE-A1DC-48E2-829D-AD9261562095",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.6.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "155F83A1-A04A-48C0-A801-B38F129F310F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.6.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "302DC06D-5FB1-4EF9-B5E1-6407B88D65FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.6.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "27A15D05-29BA-4CCC-9348-A516E1E2C079",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.6.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "2004B474-9869-445D-957D-20EF254FB461",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.6.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F91A5E0-0DD8-47DD-B52E-A15E8064945F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.6.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C34BE8D-6DFF-4E57-971C-8CCEF13E6500",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.6.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CDBC5BA-6A3C-4DB9-BE16-83A4EB85100C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.6.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF1B4950-4D56-47A2-BCE8-FB3714EA1B2C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.6.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "3194C6CE-3E8A-4861-AED1-942824974AE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D102460-B5D5-46C4-8021-7C3510A5FCF3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "92265E60-7BBF-4E8E-A438-4132D8FD57BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "346DE008-472F-47E1-8B96-F968C7D0A003",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C9BDB22-29E0-48A3-8765-FAC6A3442A35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA5EB3A7-DE33-42CB-9B5E-646B9D4FFBFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F63AB9E5-FD99-40A8-B24F-623BDDBCA427",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CEA6C3E-C41B-4EF9-84E1-72BC6B72D1C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0B873C1-E7D6-4E55-A5A7-85000B686071",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.7.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "87D2E8DD-4225-476A-AF17-7621C9A28391",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.7.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "40D913E2-0FBD-4F6C-8A21-43A0681237BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.7.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B869CEB-7637-48C3-8A4C-171CFB766B97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.7.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "75CF5BC1-7071-48A3-86A9-C843485CAED5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.7.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EB23250-EBD2-4A5F-BF5E-1DAE1A64EF0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.7.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "200DB058-C9F0-4983-AF99-EBB8FC2E7875",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.7.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "57697AAD-5264-4C05-89E4-0228DEF2E9DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.7.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "24295270-DCBF-4FF3-88F7-E9A30B6388E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.7.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "22E754F2-5D3D-437E-BB15-693D2EB58DA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.7.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF4232D2-1F70-4A06-BD11-A0DFE6CE0744",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC0E7811-3B60-46E7-943C-E0E7ED00FB01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A57A3347-6C48-4803-AB4E-A4BC0E6BFA41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "50D26799-D038-470A-A468-58DBDB64A7E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3769BD6-B104-4F74-B8C4-89398A8894FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "9757DD5E-42A6-44B8-9692-49690F60C8D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7B5A014-D4EE-4244-AABA-0873492F7295",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD9F8C2A-A94E-4D99-839B-47AAE8754191",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.8.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "69D29A9E-DB23-4D86-B4A3-3C4F663416AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "D86AEE89-9F8E-43A5-A888-F421B10DB2C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.8.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "D335628F-EC07-43BE-9B29-3365A6F64D71",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*",
              "matchCriteriaId": "F5D324C4-97C7-49D3-A809-9EAD4B690C69",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:serf_project:serf:0.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C21755B4-DD67-4627-A68C-0610C8A6BDF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:serf_project:serf:0.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "488A8919-6AF9-42DE-95EA-1FD88B1CAC9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:serf_project:serf:0.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "58A9D863-6109-40AA-8EB6-19005C079949",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:serf_project:serf:0.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "20C10025-226B-43C1-92AD-98828068335A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:serf_project:serf:0.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9F45437-9585-4343-A4ED-305B9385FCB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:serf_project:serf:0.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1725E97A-91EA-4A14-81DD-BD8030EC10E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:serf_project:serf:0.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "44BB3DA5-553A-416D-95F0-F6D5C2CB8D9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:serf_project:serf:0.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0738681-DDFF-4972-9619-6C3759E7CD99",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:serf_project:serf:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5818C3C-C1A9-4181-9C55-F2848C2D1764",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:serf_project:serf:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBF4EA90-FDC1-422D-A0D3-47475632E214",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:serf_project:serf:1.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD2C28DC-2535-4657-9A01-86A722AB1713",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:serf_project:serf:1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "44032AB1-E4BE-4C81-9E41-333DB1424542",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:serf_project:serf:1.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7114C9C-22DE-49D8-BB52-D6B19E6D9214",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:serf_project:serf:1.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFCC6E9B-1D99-4A5B-B86F-1A120071A7EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:serf_project:serf:1.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F0CD9B1-DF96-4A74-B33A-FF32B74ECA3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:serf_project:serf:1.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C04EB3-5E79-4C76-8698-3053CFF5CE5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:serf_project:serf:1.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D91AAA48-666E-4328-8F75-C2A809242270",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:serf_project:serf:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E579CE5-7A14-42F1-9BE2-E981C23AB02A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:serf_project:serf:1.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "54F6BE6E-D180-4256-9E43-6C3061D4A6BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:serf_project:serf:1.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CD3DA28-9446-41A0-88BB-C8B7F649600B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:serf_project:serf:1.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "48475524-3713-480F-B2D0-03E47F89EDE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:serf_project:serf:1.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "15774804-BBF7-4CEB-9560-014C3DC4549F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:serf_project:serf:1.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "72751936-EF52-41AB-8BC4-1F9D997074E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:serf_project:serf:1.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADB8D29C-6821-4509-BC70-E9DC80A4809F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:serf_project:serf:1.3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "46B6D1C7-12AE-4F2C-AEF5-37CFC966E05E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The (1) serf_ssl_cert_issuer, (2) serf_ssl_cert_subject, and (3) serf_ssl_cert_certificate functions in Serf 0.2.0 through 1.3.x before 1.3.7 does not properly handle a NUL byte in a domain name in the subject\u0027s Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority."
    },
    {
      "lang": "es",
      "value": "Las funciones (1) serf_ssl_cert_issuer, (2) serf_ssl_cert_subject, and (3) serf_ssl_cert_certificate en Serf 0.2.0 hasta 1.3.x anterior a 1.3.7 no manejan debidamente un byte NUL en un nombre de dominio en el campo del asunto Common Name (CN) de un certificado X.509, lo que permite a atacantes man-in-the-middle falsificar servidores SSL arbitrarios a trav\u00e9s de un certificado manipulado emitido por una autoridad de certificaci\u00f3n leg\u00edtima."
    }
  ],
  "evaluatorComment": "\u003ca href=\"http://cwe.mitre.org/data/definitions/297.html\" target=\"_blank\"\u003eCWE-297: Improper Validation of Certificate with Host Mismatch\u003c/a\u003e",
  "id": "CVE-2014-3504",
  "lastModified": "2024-11-21T02:08:14.890",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "HIGH",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 4.9,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-08-19T18:55:02.217",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2014-08/msg00038.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/59584"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/60721"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://ubuntu.com/usn/usn-2315-1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/69238"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://groups.google.com/forum/#%21topic/serf-dev/NvgPoK6sFsc"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://security.gentoo.org/glsa/201610-05"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://subversion.apache.org/security/CVE-2014-3522-advisory.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2014-08/msg00038.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/59584"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/60721"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://ubuntu.com/usn/usn-2315-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/69238"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://groups.google.com/forum/#%21topic/serf-dev/NvgPoK6sFsc"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.gentoo.org/glsa/201610-05"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://subversion.apache.org/security/CVE-2014-3522-advisory.txt"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

cve-2014-3504
Vulnerability from cvelistv5
Published
2014-08-19 18:00
Modified
2024-08-06 10:43
Severity ?
Summary
The (1) serf_ssl_cert_issuer, (2) serf_ssl_cert_subject, and (3) serf_ssl_cert_certificate functions in Serf 0.2.0 through 1.3.x before 1.3.7 does not properly handle a NUL byte in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T10:43:06.340Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "USN-2315-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://ubuntu.com/usn/usn-2315-1"
          },
          {
            "name": "69238",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/69238"
          },
          {
            "name": "60721",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/60721"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://subversion.apache.org/security/CVE-2014-3522-advisory.txt"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://groups.google.com/forum/#%21topic/serf-dev/NvgPoK6sFsc"
          },
          {
            "name": "openSUSE-SU-2014:1059",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2014-08/msg00038.html"
          },
          {
            "name": "GLSA-201610-05",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/201610-05"
          },
          {
            "name": "59584",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/59584"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-08-11T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The (1) serf_ssl_cert_issuer, (2) serf_ssl_cert_subject, and (3) serf_ssl_cert_certificate functions in Serf 0.2.0 through 1.3.x before 1.3.7 does not properly handle a NUL byte in a domain name in the subject\u0027s Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-06-30T16:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "USN-2315-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://ubuntu.com/usn/usn-2315-1"
        },
        {
          "name": "69238",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/69238"
        },
        {
          "name": "60721",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/60721"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://subversion.apache.org/security/CVE-2014-3522-advisory.txt"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://groups.google.com/forum/#%21topic/serf-dev/NvgPoK6sFsc"
        },
        {
          "name": "openSUSE-SU-2014:1059",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2014-08/msg00038.html"
        },
        {
          "name": "GLSA-201610-05",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/201610-05"
        },
        {
          "name": "59584",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/59584"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2014-3504",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The (1) serf_ssl_cert_issuer, (2) serf_ssl_cert_subject, and (3) serf_ssl_cert_certificate functions in Serf 0.2.0 through 1.3.x before 1.3.7 does not properly handle a NUL byte in a domain name in the subject\u0027s Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "USN-2315-1",
              "refsource": "UBUNTU",
              "url": "http://ubuntu.com/usn/usn-2315-1"
            },
            {
              "name": "69238",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/69238"
            },
            {
              "name": "60721",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/60721"
            },
            {
              "name": "https://subversion.apache.org/security/CVE-2014-3522-advisory.txt",
              "refsource": "CONFIRM",
              "url": "https://subversion.apache.org/security/CVE-2014-3522-advisory.txt"
            },
            {
              "name": "https://groups.google.com/forum/#!topic/serf-dev/NvgPoK6sFsc",
              "refsource": "CONFIRM",
              "url": "https://groups.google.com/forum/#!topic/serf-dev/NvgPoK6sFsc"
            },
            {
              "name": "openSUSE-SU-2014:1059",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2014-08/msg00038.html"
            },
            {
              "name": "GLSA-201610-05",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/201610-05"
            },
            {
              "name": "59584",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/59584"
            },
            {
              "name": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
              "refsource": "CONFIRM",
              "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2014-3504",
    "datePublished": "2014-08-19T18:00:00",
    "dateReserved": "2014-05-14T00:00:00",
    "dateUpdated": "2024-08-06T10:43:06.340Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}