6.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
5.9 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
0.003 Low
EPSS
Percentile
66.0%
libraries/libldap/tls_o.c in OpenLDAP 2.2 and 2.4, and possibly other
versions, when OpenSSL is used, does not properly handle a ‘\0’ character
in a domain name in the subject’s Common Name (CN) field of an X.509
certificate, which allows man-in-the-middle attackers to spoof arbitrary
SSL servers via a crafted certificate issued by a legitimate Certification
Authority, a related issue to CVE-2009-2408.
Author | Note |
---|---|
mdeslaur | openldap in hardy and intrepid only have gnutls backend we compile jaunty-lucid with gnutls, not openssl so we’re not vulnerable to this. (debian/configure.options) openldap2 in dapper has been patched with gnutls support, so not vulnerable. This is the library to which all dapper applications are linked, to not conflict with the openssl license. openldap2.2 in dapper uses openssl and is vulnerable. |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 6.06 | noarch | openldap2.2 | < 2.2.26-5ubuntu2.9 | UNKNOWN |
6.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
5.9 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
0.003 Low
EPSS
Percentile
66.0%