Vulnerability CVE-2011-0738


Published: 2011-02-01   Modified: 2012-02-13

Description:
MyProxy 5.0 through 5.2, as used in Globus Toolkit 5.0.0 through 5.0.2, does not properly verify the (1) hostname or (2) identity in the X.509 certificate for the myproxy-server, which allows remote attackers to spoof the server and conduct man-in-the-middle (MITM) attacks via a crafted certificate when executing (a) myproxy-logon or (b) myproxy-get-delegation.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
MyProxy SSL Certificate Validation Security Bypass Vulnerability
Venkat Yekkirala
03.02.2011

Type:

CWE-20

(Improper Input Validation)

CVSS2 => (AV:N/AC:M/Au:N/C:N/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.3/10
2.9/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
None
Partial
None
Affected software
NCSA -> Myproxy 
Globus -> Globus toolkit 

 References:
http://lists.globus.org/pipermail/security-announce/2011-January/000018.html
http://xforce.iss.net/xforce/xfdb/64830
http://www.vupen.com/english/advisories/2011/0227
http://www.securityfocus.com/bid/45916
http://secunia.com/advisories/43103
http://secunia.com/advisories/42972
http://osvdb.org/70494
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053473.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053461.html
http://grid.ncsa.illinois.edu/myproxy/security/myproxy-adv-2011-01.txt

Copyright 2024, cxsecurity.com

 

Back to Top