Apache Libcloud 0.11.1 Possible Man In The Middle (MITM)

2012.08.03
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-20


Ogólna skala CVSS: 5.8/10
Znaczenie: 4.9/10
Łatwość wykorzystania: 8.6/10
Wymagany dostęp: Zdalny
Złożoność ataku: Średnia
Autoryzacja: Nie wymagana
Wpływ na poufność: Częściowy
Wpływ na integralność: Częściowy
Wpływ na dostępność: Brak

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 CVE-2012-3446: Apache Libcloud - possible MITM due to invalid regular expression used to validate the target server hostname Severity: Medium Vendor: The Apache Software Foundation Versions Affected: Apache Libcloud 0.4.2 to 0.11.1 Versions prior to 0.4.2 don't perform any target server SSL certificate validation. Description: When establishing a secure (SSL / TLS) connection to a target server an invalid regular expression has been used for performing the hostname verification. Subset instead of the full target server hostname has been marked an an acceptable match for the given hostname. For example, certificate with a hostname field of "aexample.com" was considered a valid certificate for domain "example.com". Mitigation: Users should upgrade to the latest version (0.11.1) which includes a fix. Credit: This issue was discovered by researchers from the University of Texas at Austin (Martin Georgiev, Suman Jana and Vitaly Shmatikov). References: http://libcloud.apache.org/security.html -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux) iQIcBAEBAgAGBQJQGbcOAAoJECwHVLLOBpLzvtkP+QGG3oCBENSNpFArN6ygWFT7 2zXuYu0FNPubrbxJEYLHwI/DwXU/P0u8nS1aatuTiH5iLJsJ1qdjTAEETBuFZ03L nXvJBi5Im2wzKOHmVsQmX+y2Q2F7SW88q8bCA2VoPZtiXaNssY4RJL7i9JNuJ+v7 palfmxO01u/WatTV9KrEaH3PlYtrvFDtHa71pGXgguxOsf6+iGYBTQJCe2yYDsbn 31wiaeamUc76IxqvS29HXL6NJGVomMmlbfPB8Xk+Cpa5UteYjL1GukUKLTrYDNxN M+mokeh6Ei/EOCIwIptZqHCKhAlygbaheAc4ectZWYsjZC5QlA184Vj95hbvbfYv cqfS9RDKlcdOLFQcXE8cvDd/0B/AnIAroFN//uyIHftu3D8tf2Pwa8eVL23/qRIM pZxjrlzeM6fnue29xKK8eCk0U3hmIivO+WUK+JZ1vu0lICNbgXhnochbSksnT1DC zCaU5mE0BGF+LpQaXknQXAoiEJuK7/ZCLCwQkaKH1khJZ5LqjCXT++SUw6/RCzh/ eLKkjJ6HyMGzWmThH3zmGMIvCho8hTwT71b6rrC/Emy+22OwpdERLIqohGTIPiv6 AvloMd/MjTIC/KABt0eJ2atdId7NbSx5rIfjoY0CmdPL1O+h2ByJxY6RYl/BQAML dif1G0UaHzsQ1jgPLF6x =U7hz -----END PGP SIGNATURE-----

Referencje:

http://libcloud.apache.org/security.html


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top