Lucene search

K
cve[email protected]CVE-2009-3767
HistoryOct 23, 2009 - 7:30 p.m.

CVE-2009-3767

2009-10-2319:30:00
CWE-295
web.nvd.nist.gov
69
openldap
tls
openssl
cve-2009-3767
x.509 certificate
man-in-the-middle attack
ssl
certification authority
nvd

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

6.2 Medium

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

66.0%

libraries/libldap/tls_o.c in OpenLDAP 2.2 and 2.4, and possibly other versions, when OpenSSL is used, does not properly handle a ‘\0’ character in a domain name in the subject’s Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.

Affected configurations

NVD
Node
openldapopenldapRange<2.4.18
AND
opensslopenssl
Node
applemac_os_xRange<10.6.2
Node
fedoraprojectfedoraMatch11
CPENameOperatorVersion
openldap:openldapopenldaplt2.4.18

References

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

6.2 Medium

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

66.0%