Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 456942 - dev-java/commons-httpclient : Wildcard matching in SSL hostname verifier incorrect
Summary: dev-java/commons-httpclient : Wildcard matching in SSL hostname verifier inco...
Status: RESOLVED INVALID
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
URL: https://bugzilla.redhat.com/show_bug....
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2013-02-12 14:38 UTC by Agostino Sarubbo
Modified: 2013-02-12 15:02 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2013-02-12 14:38:31 UTC
From ${URL} :

Originally, Common Vulnerabilities and Exposures assigned an identifier CVE-2012-5783 to the 
following vulnerability:

Apache Commons HttpClient 3.x, as used in Amazon Flexible Payments Service (FPS) merchant Java SDK 
and other products, does not verify that the server hostname matches a domain name in the subject's 
Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle 
attackers to spoof SSL servers via an arbitrary valid certificate.

Later it was found, that the SSL hostname verifier implementation (CVE-2012-5783 fix) contained a 
bug in wildcard matching:
[1] https://issues.apache.org/jira/browse/HTTPCLIENT-1255

which still allowed certain type of certificates checks to pass, even if they shouldn't.

Relevant upstream patches:
[2] https://fisheye6.atlassian.com/changelog/httpcomponents?cs=1406213
    (against 4.2.x branch)
[3] https://fisheye6.atlassian.com/changelog/httpcomponents?cs=1406217
    (against trunk)

References:
[4] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700268
Comment 1 Agostino Sarubbo gentoo-dev 2013-02-12 15:02:38 UTC
this appears to be invalid http://www.openwall.com/lists/oss-security/2013/02/12/2