All the vulnerabilites related to serf_project - serf
Vulnerability from fkie_nvd
Published
2014-08-19 18:55
Modified
2024-11-21 02:08
Severity ?
Summary
The (1) serf_ssl_cert_issuer, (2) serf_ssl_cert_subject, and (3) serf_ssl_cert_certificate functions in Serf 0.2.0 through 1.3.x before 1.3.7 does not properly handle a NUL byte in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:subversion:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "13109084-931E-4565-BEE5-794B83E6978D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "4ED3EA46-88F7-438D-B8FC-D6C5E1C8984C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "726B9C10-ACD5-41C2-A552-FD0046A75966", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "87D72A75-EDB9-4AD1-B6FC-8A918804DE0B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "B55A7A26-C994-4956-BBE7-BF3A51971295", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "FB9E26AB-915A-477F-BA5C-10965A7098F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "DFD49A9B-16A7-4362-8D62-6EB5ECBE4296", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "7B0CB798-F4ED-44E5-9B15-B7009EAC6303", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "FC3F6E5C-CF55-4CEB-A5B6-D49E0234FF3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "C2C1DD29-88D2-49DE-9B77-D925A4B9EB7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "67130DAF-AE81-43D2-A208-58A53746A7E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "FB9F8426-38CB-46B4-B0D0-8D16B48DD53F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "90631FFA-9AB2-483D-B162-31A47428D280", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "8BD5A981-3FDD-4E74-8EB2-5F324246FFF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "88F4E8C9-671B-4DA3-9D0D-98539D8D4FE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "341F900B-5179-4CB4-9F41-91B58B29C414", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "3F34F463-6350-4F48-B037-856DDBB1A4FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "B2C813BA-B8F9-446B-A07F-B51F26815578", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "3DF4080D-0D95-429E-88AA-1051A5520C01", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "CF50F098-A055-4B79-AC35-6BD6F32D70F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "540461D4-87F4-42AB-ADDC-C7A067FE2893", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "3E676744-C623-4894-8764-43588E56D2FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "669735D1-1C14-4CD7-AA7C-AD2CA63A1979", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "D4C568FD-54BC-4506-AF60-BFE7CE14D0F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "D5F71F24-D909-49D9-8B4F-FA757FDF1C25", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.9:*:*:*:*:*:*:*", "matchCriteriaId": "034D1C36-B73E-443E-A6B4-44CC6E7BC043", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.10:*:*:*:*:*:*:*", "matchCriteriaId": "6D373245-8384-45E4-BE2E-E0518BD7F84F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.11:*:*:*:*:*:*:*", "matchCriteriaId": "EED44413-D313-4588-9A4B-25F79D0925A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.12:*:*:*:*:*:*:*", "matchCriteriaId": "C193EB08-BBC2-43A2-B11A-9C7E2098862D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.13:*:*:*:*:*:*:*", "matchCriteriaId": "022A5BCE-A1DC-48E2-829D-AD9261562095", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.14:*:*:*:*:*:*:*", "matchCriteriaId": "155F83A1-A04A-48C0-A801-B38F129F310F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.15:*:*:*:*:*:*:*", "matchCriteriaId": "302DC06D-5FB1-4EF9-B5E1-6407B88D65FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.16:*:*:*:*:*:*:*", "matchCriteriaId": "27A15D05-29BA-4CCC-9348-A516E1E2C079", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.17:*:*:*:*:*:*:*", "matchCriteriaId": "2004B474-9869-445D-957D-20EF254FB461", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.18:*:*:*:*:*:*:*", "matchCriteriaId": "8F91A5E0-0DD8-47DD-B52E-A15E8064945F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.19:*:*:*:*:*:*:*", "matchCriteriaId": "9C34BE8D-6DFF-4E57-971C-8CCEF13E6500", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.20:*:*:*:*:*:*:*", "matchCriteriaId": "2CDBC5BA-6A3C-4DB9-BE16-83A4EB85100C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.21:*:*:*:*:*:*:*", "matchCriteriaId": "DF1B4950-4D56-47A2-BCE8-FB3714EA1B2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.23:*:*:*:*:*:*:*", "matchCriteriaId": "3194C6CE-3E8A-4861-AED1-942824974AE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "8D102460-B5D5-46C4-8021-7C3510A5FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "92265E60-7BBF-4E8E-A438-4132D8FD57BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "346DE008-472F-47E1-8B96-F968C7D0A003", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "4C9BDB22-29E0-48A3-8765-FAC6A3442A35", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "FA5EB3A7-DE33-42CB-9B5E-646B9D4FFBFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "F63AB9E5-FD99-40A8-B24F-623BDDBCA427", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.6:*:*:*:*:*:*:*", "matchCriteriaId": "0CEA6C3E-C41B-4EF9-84E1-72BC6B72D1C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.7:*:*:*:*:*:*:*", "matchCriteriaId": "B0B873C1-E7D6-4E55-A5A7-85000B686071", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.8:*:*:*:*:*:*:*", "matchCriteriaId": "87D2E8DD-4225-476A-AF17-7621C9A28391", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.9:*:*:*:*:*:*:*", "matchCriteriaId": "40D913E2-0FBD-4F6C-8A21-43A0681237BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.10:*:*:*:*:*:*:*", "matchCriteriaId": "4B869CEB-7637-48C3-8A4C-171CFB766B97", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.11:*:*:*:*:*:*:*", "matchCriteriaId": "75CF5BC1-7071-48A3-86A9-C843485CAED5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.12:*:*:*:*:*:*:*", "matchCriteriaId": "9EB23250-EBD2-4A5F-BF5E-1DAE1A64EF0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.13:*:*:*:*:*:*:*", "matchCriteriaId": "200DB058-C9F0-4983-AF99-EBB8FC2E7875", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.14:*:*:*:*:*:*:*", "matchCriteriaId": "57697AAD-5264-4C05-89E4-0228DEF2E9DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.15:*:*:*:*:*:*:*", "matchCriteriaId": "24295270-DCBF-4FF3-88F7-E9A30B6388E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.16:*:*:*:*:*:*:*", "matchCriteriaId": "22E754F2-5D3D-437E-BB15-693D2EB58DA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.17:*:*:*:*:*:*:*", "matchCriteriaId": "CF4232D2-1F70-4A06-BD11-A0DFE6CE0744", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "EC0E7811-3B60-46E7-943C-E0E7ED00FB01", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "A57A3347-6C48-4803-AB4E-A4BC0E6BFA41", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "50D26799-D038-470A-A468-58DBDB64A7E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "D3769BD6-B104-4F74-B8C4-89398A8894FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "9757DD5E-42A6-44B8-9692-49690F60C8D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "A7B5A014-D4EE-4244-AABA-0873492F7295", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.6:*:*:*:*:*:*:*", "matchCriteriaId": "CD9F8C2A-A94E-4D99-839B-47AAE8754191", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.7:*:*:*:*:*:*:*", "matchCriteriaId": "69D29A9E-DB23-4D86-B4A3-3C4F663416AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.8:*:*:*:*:*:*:*", "matchCriteriaId": "D86AEE89-9F8E-43A5-A888-F421B10DB2C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.9:*:*:*:*:*:*:*", "matchCriteriaId": "D335628F-EC07-43BE-9B29-3365A6F64D71", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*", "matchCriteriaId": "F5D324C4-97C7-49D3-A809-9EAD4B690C69", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:serf_project:serf:0.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "C21755B4-DD67-4627-A68C-0610C8A6BDF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:serf_project:serf:0.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "488A8919-6AF9-42DE-95EA-1FD88B1CAC9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:serf_project:serf:0.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "58A9D863-6109-40AA-8EB6-19005C079949", "vulnerable": true }, { "criteria": "cpe:2.3:a:serf_project:serf:0.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "20C10025-226B-43C1-92AD-98828068335A", "vulnerable": true }, { "criteria": "cpe:2.3:a:serf_project:serf:0.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "A9F45437-9585-4343-A4ED-305B9385FCB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:serf_project:serf:0.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "1725E97A-91EA-4A14-81DD-BD8030EC10E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:serf_project:serf:0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "44BB3DA5-553A-416D-95F0-F6D5C2CB8D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:serf_project:serf:0.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "D0738681-DDFF-4972-9619-6C3759E7CD99", "vulnerable": true }, { "criteria": "cpe:2.3:a:serf_project:serf:0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "B5818C3C-C1A9-4181-9C55-F2848C2D1764", "vulnerable": true }, { "criteria": "cpe:2.3:a:serf_project:serf:0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "EBF4EA90-FDC1-422D-A0D3-47475632E214", "vulnerable": true }, { "criteria": "cpe:2.3:a:serf_project:serf:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "FD2C28DC-2535-4657-9A01-86A722AB1713", "vulnerable": true }, { "criteria": "cpe:2.3:a:serf_project:serf:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "44032AB1-E4BE-4C81-9E41-333DB1424542", "vulnerable": true }, { "criteria": "cpe:2.3:a:serf_project:serf:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F7114C9C-22DE-49D8-BB52-D6B19E6D9214", "vulnerable": true }, { "criteria": "cpe:2.3:a:serf_project:serf:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "CFCC6E9B-1D99-4A5B-B86F-1A120071A7EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:serf_project:serf:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "1F0CD9B1-DF96-4A74-B33A-FF32B74ECA3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:serf_project:serf:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "D2C04EB3-5E79-4C76-8698-3053CFF5CE5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:serf_project:serf:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "D91AAA48-666E-4328-8F75-C2A809242270", "vulnerable": true }, { "criteria": "cpe:2.3:a:serf_project:serf:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "0E579CE5-7A14-42F1-9BE2-E981C23AB02A", "vulnerable": true }, { "criteria": "cpe:2.3:a:serf_project:serf:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "54F6BE6E-D180-4256-9E43-6C3061D4A6BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:serf_project:serf:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "7CD3DA28-9446-41A0-88BB-C8B7F649600B", "vulnerable": true }, { "criteria": "cpe:2.3:a:serf_project:serf:1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "48475524-3713-480F-B2D0-03E47F89EDE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:serf_project:serf:1.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "15774804-BBF7-4CEB-9560-014C3DC4549F", "vulnerable": true }, { "criteria": "cpe:2.3:a:serf_project:serf:1.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "72751936-EF52-41AB-8BC4-1F9D997074E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:serf_project:serf:1.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "ADB8D29C-6821-4509-BC70-E9DC80A4809F", "vulnerable": true }, { "criteria": "cpe:2.3:a:serf_project:serf:1.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "46B6D1C7-12AE-4F2C-AEF5-37CFC966E05E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The (1) serf_ssl_cert_issuer, (2) serf_ssl_cert_subject, and (3) serf_ssl_cert_certificate functions in Serf 0.2.0 through 1.3.x before 1.3.7 does not properly handle a NUL byte in a domain name in the subject\u0027s Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority." }, { "lang": "es", "value": "Las funciones (1) serf_ssl_cert_issuer, (2) serf_ssl_cert_subject, and (3) serf_ssl_cert_certificate en Serf 0.2.0 hasta 1.3.x anterior a 1.3.7 no manejan debidamente un byte NUL en un nombre de dominio en el campo del asunto Common Name (CN) de un certificado X.509, lo que permite a atacantes man-in-the-middle falsificar servidores SSL arbitrarios a trav\u00e9s de un certificado manipulado emitido por una autoridad de certificaci\u00f3n leg\u00edtima." } ], "evaluatorComment": "\u003ca href=\"http://cwe.mitre.org/data/definitions/297.html\" target=\"_blank\"\u003eCWE-297: Improper Validation of Certificate with Host Mismatch\u003c/a\u003e", "id": "CVE-2014-3504", "lastModified": "2024-11-21T02:08:14.890", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-08-19T18:55:02.217", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-updates/2014-08/msg00038.html" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/59584" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/60721" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://ubuntu.com/usn/usn-2315-1" }, { "source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/69238" }, { "source": "secalert@redhat.com", "url": "https://groups.google.com/forum/#%21topic/serf-dev/NvgPoK6sFsc" }, { "source": "secalert@redhat.com", "url": "https://security.gentoo.org/glsa/201610-05" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://subversion.apache.org/security/CVE-2014-3522-advisory.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2014-08/msg00038.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/59584" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/60721" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://ubuntu.com/usn/usn-2315-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/69238" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://groups.google.com/forum/#%21topic/serf-dev/NvgPoK6sFsc" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201610-05" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://subversion.apache.org/security/CVE-2014-3522-advisory.txt" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2014-3504
Vulnerability from cvelistv5
Published
2014-08-19 18:00
Modified
2024-08-06 10:43
Severity ?
EPSS score ?
Summary
The (1) serf_ssl_cert_issuer, (2) serf_ssl_cert_subject, and (3) serf_ssl_cert_certificate functions in Serf 0.2.0 through 1.3.x before 1.3.7 does not properly handle a NUL byte in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.
References
▼ | URL | Tags |
---|---|---|
http://ubuntu.com/usn/usn-2315-1 | vendor-advisory, x_refsource_UBUNTU | |
http://www.securityfocus.com/bid/69238 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/60721 | third-party-advisory, x_refsource_SECUNIA | |
https://subversion.apache.org/security/CVE-2014-3522-advisory.txt | x_refsource_CONFIRM | |
https://groups.google.com/forum/#%21topic/serf-dev/NvgPoK6sFsc | x_refsource_CONFIRM | |
http://lists.opensuse.org/opensuse-updates/2014-08/msg00038.html | vendor-advisory, x_refsource_SUSE | |
https://security.gentoo.org/glsa/201610-05 | vendor-advisory, x_refsource_GENTOO | |
http://secunia.com/advisories/59584 | third-party-advisory, x_refsource_SECUNIA | |
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:43:06.340Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "USN-2315-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://ubuntu.com/usn/usn-2315-1" }, { "name": "69238", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/69238" }, { "name": "60721", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/60721" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://subversion.apache.org/security/CVE-2014-3522-advisory.txt" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://groups.google.com/forum/#%21topic/serf-dev/NvgPoK6sFsc" }, { "name": "openSUSE-SU-2014:1059", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-08/msg00038.html" }, { "name": "GLSA-201610-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201610-05" }, { "name": "59584", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59584" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-08-11T00:00:00", "descriptions": [ { "lang": "en", "value": "The (1) serf_ssl_cert_issuer, (2) serf_ssl_cert_subject, and (3) serf_ssl_cert_certificate functions in Serf 0.2.0 through 1.3.x before 1.3.7 does not properly handle a NUL byte in a domain name in the subject\u0027s Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-06-30T16:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "USN-2315-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://ubuntu.com/usn/usn-2315-1" }, { "name": "69238", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/69238" }, { "name": "60721", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/60721" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://subversion.apache.org/security/CVE-2014-3522-advisory.txt" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://groups.google.com/forum/#%21topic/serf-dev/NvgPoK6sFsc" }, { "name": "openSUSE-SU-2014:1059", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-08/msg00038.html" }, { "name": "GLSA-201610-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201610-05" }, { "name": "59584", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59584" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-3504", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The (1) serf_ssl_cert_issuer, (2) serf_ssl_cert_subject, and (3) serf_ssl_cert_certificate functions in Serf 0.2.0 through 1.3.x before 1.3.7 does not properly handle a NUL byte in a domain name in the subject\u0027s Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "USN-2315-1", "refsource": "UBUNTU", "url": "http://ubuntu.com/usn/usn-2315-1" }, { "name": "69238", "refsource": "BID", "url": "http://www.securityfocus.com/bid/69238" }, { "name": "60721", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60721" }, { "name": "https://subversion.apache.org/security/CVE-2014-3522-advisory.txt", "refsource": "CONFIRM", "url": "https://subversion.apache.org/security/CVE-2014-3522-advisory.txt" }, { "name": "https://groups.google.com/forum/#!topic/serf-dev/NvgPoK6sFsc", "refsource": "CONFIRM", "url": "https://groups.google.com/forum/#!topic/serf-dev/NvgPoK6sFsc" }, { "name": "openSUSE-SU-2014:1059", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2014-08/msg00038.html" }, { "name": "GLSA-201610-05", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201610-05" }, { "name": "59584", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59584" }, { "name": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2014-3504", "datePublished": "2014-08-19T18:00:00", "dateReserved": "2014-05-14T00:00:00", "dateUpdated": "2024-08-06T10:43:06.340Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }