Lucene search

K
nvd[email protected]NVD:CVE-2014-3504
HistoryAug 19, 2014 - 6:55 p.m.

CVE-2014-3504

2014-08-1918:55:02
web.nvd.nist.gov
2

4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:H/Au:N/C:P/I:P/A:N

6.1 Medium

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

31.7%

The (1) serf_ssl_cert_issuer, (2) serf_ssl_cert_subject, and (3) serf_ssl_cert_certificate functions in Serf 0.2.0 through 1.3.x before 1.3.7 does not properly handle a NUL byte in a domain name in the subject’s Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.

Affected configurations

NVD
Node
apachesubversionMatch1.4.0
OR
apachesubversionMatch1.4.1
OR
apachesubversionMatch1.4.2
OR
apachesubversionMatch1.4.3
OR
apachesubversionMatch1.4.4
OR
apachesubversionMatch1.4.5
OR
apachesubversionMatch1.4.6
OR
apachesubversionMatch1.5.0
OR
apachesubversionMatch1.5.1
OR
apachesubversionMatch1.5.2
OR
apachesubversionMatch1.5.3
OR
apachesubversionMatch1.5.4
OR
apachesubversionMatch1.5.5
OR
apachesubversionMatch1.5.6
OR
apachesubversionMatch1.5.7
OR
apachesubversionMatch1.5.8
OR
apachesubversionMatch1.6.0
OR
apachesubversionMatch1.6.1
OR
apachesubversionMatch1.6.2
OR
apachesubversionMatch1.6.3
OR
apachesubversionMatch1.6.4
OR
apachesubversionMatch1.6.5
OR
apachesubversionMatch1.6.6
OR
apachesubversionMatch1.6.7
OR
apachesubversionMatch1.6.8
OR
apachesubversionMatch1.6.9
OR
apachesubversionMatch1.6.10
OR
apachesubversionMatch1.6.11
OR
apachesubversionMatch1.6.12
OR
apachesubversionMatch1.6.13
OR
apachesubversionMatch1.6.14
OR
apachesubversionMatch1.6.15
OR
apachesubversionMatch1.6.16
OR
apachesubversionMatch1.6.17
OR
apachesubversionMatch1.6.18
OR
apachesubversionMatch1.6.19
OR
apachesubversionMatch1.6.20
OR
apachesubversionMatch1.6.21
OR
apachesubversionMatch1.6.23
OR
apachesubversionMatch1.7.0
OR
apachesubversionMatch1.7.1
OR
apachesubversionMatch1.7.2
OR
apachesubversionMatch1.7.3
OR
apachesubversionMatch1.7.4
OR
apachesubversionMatch1.7.5
OR
apachesubversionMatch1.7.6
OR
apachesubversionMatch1.7.7
OR
apachesubversionMatch1.7.8
OR
apachesubversionMatch1.7.9
OR
apachesubversionMatch1.7.10
OR
apachesubversionMatch1.7.11
OR
apachesubversionMatch1.7.12
OR
apachesubversionMatch1.7.13
OR
apachesubversionMatch1.7.14
OR
apachesubversionMatch1.7.15
OR
apachesubversionMatch1.7.16
OR
apachesubversionMatch1.7.17
OR
apachesubversionMatch1.8.0
OR
apachesubversionMatch1.8.1
OR
apachesubversionMatch1.8.2
OR
apachesubversionMatch1.8.3
OR
apachesubversionMatch1.8.4
OR
apachesubversionMatch1.8.5
OR
apachesubversionMatch1.8.6
OR
apachesubversionMatch1.8.7
OR
apachesubversionMatch1.8.8
OR
apachesubversionMatch1.8.9
Node
canonicalubuntu_linuxMatch12.04-lts
OR
canonicalubuntu_linuxMatch14.04lts
Node
serf_projectserfMatch0.2.0
OR
serf_projectserfMatch0.3.0
OR
serf_projectserfMatch0.3.1
OR
serf_projectserfMatch0.4.0
OR
serf_projectserfMatch0.5.0
OR
serf_projectserfMatch0.6.0
OR
serf_projectserfMatch0.6.1
OR
serf_projectserfMatch0.7.0
OR
serf_projectserfMatch0.7.1
OR
serf_projectserfMatch0.7.2
OR
serf_projectserfMatch1.0.0
OR
serf_projectserfMatch1.0.1
OR
serf_projectserfMatch1.0.2
OR
serf_projectserfMatch1.0.3
OR
serf_projectserfMatch1.1.0
OR
serf_projectserfMatch1.1.1
OR
serf_projectserfMatch1.2.0
OR
serf_projectserfMatch1.2.1
OR
serf_projectserfMatch1.3.0
OR
serf_projectserfMatch1.3.1
OR
serf_projectserfMatch1.3.2
OR
serf_projectserfMatch1.3.3
OR
serf_projectserfMatch1.3.4
OR
serf_projectserfMatch1.3.5
OR
serf_projectserfMatch1.3.6

4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:H/Au:N/C:P/I:P/A:N

6.1 Medium

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

31.7%