ID CVE-2009-3765
Summary mutt_ssl.c in mutt 1.5.19 and 1.5.20, when OpenSSL is used, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
References
Vulnerable Configurations
  • cpe:2.3:a:mutt:mutt:1.5.19:*:*:*:*:*:*:*
    cpe:2.3:a:mutt:mutt:1.5.19:*:*:*:*:*:*:*
  • cpe:2.3:a:mutt:mutt:1.5.20:*:*:*:*:*:*:*
    cpe:2.3:a:mutt:mutt:1.5.20:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*
CVSS
Base: 6.8 (as of 29-10-2009 - 04:00)
Impact:
Exploitability:
CWE CWE-310
CAPEC
  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:M/Au:N/C:P/I:P/A:P
refmap via4
confirm http://dev.mutt.org/trac/changeset/6016:dc09812e63a3/mutt_ssl.c
mlist
  • [oss-security] 20090903 More CVE-2009-2408 like issues
  • [oss-security] 20090923 Re: More CVE-2009-2408 like issues
suse SUSE-SR:2009:016
statements via4
contributor Tomas Hoger
lastmodified 2009-10-26
organization Red Hat
statement Not vulnerable. This issue did not affect the versions of mutt as shipped with Red Hat Enterprise Linux 3, 4, or 5.
Last major update 29-10-2009 - 04:00
Published 23-10-2009 - 19:30
Last modified 29-10-2009 - 04:00
Back to Top