Summary: | <www-servers/axis-1.4-r2: Hostname verification susceptible to MITM attack (CVE-2014-3596) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | CC: | java |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://bugzilla.redhat.com/show_bug.cgi?id=1129935 | ||
Whiteboard: | B3 [noglsa] | ||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | |||
Bug Blocks: | 441904 |
Description
Agostino Sarubbo
![]() CVE-2014-3596 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3596): The getCN function in Apache Axis 1.4 and earlier does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a certificate with a subject that specifies a common name in a field that is not the CN field. NOTE: this issue exists because of an incomplete fix for CVE-2012-5784. Upstream Bug: https://issues.apache.org/jira/browse/AXIS-2905 +*axis-1.4-r2 (13 Jun 2015) + + 13 Jun 2015; Patrice Clement <monsieurp@gentoo.org> +axis-1.4-r2.ebuild, + +files/axis-1.4-JSSESocketFactory.java.patch: + EAPI 5 bump. Add patch against CVE-2014-3596. Fix security bug 520304. + Arch teams, Please stabilise: =www-server/axis-1.4-r2 Target arches: amd64 x86 Thanks. amd64 stable x86 stable. Maintainer(s), please cleanup. Security, please vote. + 15 Jun 2015; Patrice Clement <monsieurp@gentoo.org> -axis-1.4-r1.ebuild: + Remove old. + Thanks! GLSA Vote: No GLSA Vote: No Thank you closing - noglsa. |