ID CVE-2007-6591
Summary KDE Konqueror 3.5.5 and 3.95.00, when a user accepts an SSL server certificate on the basis of the CN domain name in the DN field, regards the certificate as also accepted for all domain names in subjectAltName:dNSName fields, even though these fields cannot be examined in the product, which makes it easier for remote attackers to trick a user into accepting an invalid certificate for a spoofed web site.
References
Vulnerable Configurations
  • cpe:2.3:a:kde:konqueror:3.5.5:*:*:*:*:*:*:*
    cpe:2.3:a:kde:konqueror:3.5.5:*:*:*:*:*:*:*
  • cpe:2.3:a:kde:konqueror:3.95.00:*:*:*:*:*:*:*
    cpe:2.3:a:kde:konqueror:3.95.00:*:*:*:*:*:*:*
CVSS
Base: 4.3 (as of 15-10-2018 - 21:55)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL NONE NONE
cvss-vector via4 AV:N/AC:M/Au:N/C:P/I:N/A:N
refmap via4
bugtraq
  • 20071118 Certificate spoofing issue with Mozilla, Konqueror, Safari 2
  • 20071118 RE: Certificate spoofing issue with Mozilla, Konqueror, Safari 2
  • 20071118 Re: Certificate spoofing issue with Mozilla, Konqueror, Safari 2
misc http://nils.toedtmann.net/pub/subjectAltName.txt
sreason 3498
statements via4
contributor Joshua Bressers
lastmodified 2008-01-10
organization Red Hat
statement Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2007-6591 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/#low
Last major update 15-10-2018 - 21:55
Published 28-12-2007 - 21:46
Last modified 15-10-2018 - 21:55
Back to Top