ID CVE-2014-3604
Summary Certificates.java in Not Yet Commons SSL before 0.3.15 does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
References
Vulnerable Configurations
  • cpe:2.3:a:not_yet_commons_ssl_project:not_yet_commons_ssl:0.3.14:*:*:*:*:*:*:*
    cpe:2.3:a:not_yet_commons_ssl_project:not_yet_commons_ssl:0.3.14:*:*:*:*:*:*:*
CVSS
Base: 6.8 (as of 05-01-2018 - 02:29)
Impact:
Exploitability:
CWE CWE-310
CAPEC
  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:M/Au:N/C:P/I:P/A:P
redhat via4
advisories
rhsa
id RHSA-2015:1888
refmap via4
confirm http://juliusdavies.ca/svn/viewvc.cgi/not-yet-commons-ssl?view=rev&revision=172
misc
xf notyetcommons-cve20143604-sec-bypass(97659)
Last major update 05-01-2018 - 02:29
Published 25-10-2014 - 00:55
Last modified 05-01-2018 - 02:29
Back to Top