CVE-2009-3766

mutt_ssl.c in mutt 1.5.16 and other versions before 1.5.19, when OpenSSL is used, does not verify the domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
References
Link Resource
http://dev.mutt.org/trac/ticket/3087 Patch Vendor Advisory
http://marc.info/?l=oss-security&m=125198917018936&w=2 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2009/10/26/1 Mailing List Third Party Advisory
http://dev.mutt.org/trac/ticket/3087 Patch Vendor Advisory
http://marc.info/?l=oss-security&m=125198917018936&w=2 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2009/10/26/1 Mailing List Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:mutt:mutt:*:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*

History

21 Nov 2024, 01:08

Type Values Removed Values Added
References () http://dev.mutt.org/trac/ticket/3087 - Patch, Vendor Advisory () http://dev.mutt.org/trac/ticket/3087 - Patch, Vendor Advisory
References () http://marc.info/?l=oss-security&m=125198917018936&w=2 - Mailing List, Third Party Advisory () http://marc.info/?l=oss-security&m=125198917018936&w=2 - Mailing List, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2009/10/26/1 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2009/10/26/1 - Mailing List, Third Party Advisory

Information

Published : 2009-10-23 19:30

Updated : 2024-11-21 01:08


NVD link : CVE-2009-3766

Mitre link : CVE-2009-3766

CVE.ORG link : CVE-2009-3766


JSON object : View

Products Affected

mutt

  • mutt

openssl

  • openssl
CWE
CWE-310

Cryptographic Issues