ID CVE-2009-2702
Summary KDE KSSL in kdelibs 3.5.4, 4.2.4, and 4.3 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
References
Vulnerable Configurations
  • cpe:2.3:a:kde:kdelibs:3.5.4:*:*:*:*:*:*:*
    cpe:2.3:a:kde:kdelibs:3.5.4:*:*:*:*:*:*:*
  • cpe:2.3:a:kde:kdelibs:4.2.4:*:*:*:*:*:*:*
    cpe:2.3:a:kde:kdelibs:4.2.4:*:*:*:*:*:*:*
  • cpe:2.3:a:kde:kdelibs:4.3:*:*:*:*:*:*:*
    cpe:2.3:a:kde:kdelibs:4.3:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 19-01-2012 - 03:40)
Impact:
Exploitability:
CWE CWE-310
CAPEC
  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
refmap via4
confirm https://bugzilla.redhat.com/show_bug.cgi?id=520661
mandriva
  • MDVSA-2009:330
  • MDVSA-2011:162
secunia 36468
vupen ADV-2009-2532
statements via4
contributor Tomas Hoger
lastmodified 2009-09-18
organization Red Hat
statement Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2009-2702 This issue did not affect kdelibs packages as shipped in Red Hat Enterprise Linux 3 and 4. The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw in Red Hat Enterprise Linux 5.
Last major update 19-01-2012 - 03:40
Published 08-09-2009 - 18:30
Last modified 19-01-2012 - 03:40
Back to Top