ID CVE-2013-1651
Summary OXUpdater in Open-Xchange Server before 6.20.7 rev14, 6.22.0 before rev13, and 6.22.1 before rev14 does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof update servers and install arbitrary software via a crafted certificate.
References
Vulnerable Configurations
  • cpe:2.3:a:open-xchange:open-xchange_server:6.20.7:*:*:*:*:*:*:*
    cpe:2.3:a:open-xchange:open-xchange_server:6.20.7:*:*:*:*:*:*:*
  • cpe:2.3:a:open-xchange:open-xchange_server:6.22.0:*:*:*:*:*:*:*
    cpe:2.3:a:open-xchange:open-xchange_server:6.22.0:*:*:*:*:*:*:*
  • cpe:2.3:a:open-xchange:open-xchange_server:6.22.1:*:*:*:*:*:*:*
    cpe:2.3:a:open-xchange:open-xchange_server:6.22.1:*:*:*:*:*:*:*
CVSS
Base: 5.8 (as of 05-03-2014 - 19:01)
Impact:
Exploitability:
CWE CWE-310
CAPEC
  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL NONE
cvss-vector via4 AV:N/AC:M/Au:N/C:P/I:P/A:N
refmap via4
bugtraq 20130313 Open-Xchange Security Advisory 2013-03-13
Last major update 05-03-2014 - 19:01
Published 05-09-2013 - 11:44
Last modified 05-03-2014 - 19:01
Back to Top