mutt_ssl.c in mutt 1.5.16 and other versions before 1.5.19, when OpenSSL is used, does not verify the domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
References
Link | Resource |
---|---|
http://dev.mutt.org/trac/ticket/3087 | Patch Vendor Advisory |
http://marc.info/?l=oss-security&m=125198917018936&w=2 | Mailing List Third Party Advisory |
http://www.openwall.com/lists/oss-security/2009/10/26/1 | Mailing List Third Party Advisory |
http://dev.mutt.org/trac/ticket/3087 | Patch Vendor Advisory |
http://marc.info/?l=oss-security&m=125198917018936&w=2 | Mailing List Third Party Advisory |
http://www.openwall.com/lists/oss-security/2009/10/26/1 | Mailing List Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 01:08
Type | Values Removed | Values Added |
---|---|---|
References | () http://dev.mutt.org/trac/ticket/3087 - Patch, Vendor Advisory | |
References | () http://marc.info/?l=oss-security&m=125198917018936&w=2 - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2009/10/26/1 - Mailing List, Third Party Advisory |
Information
Published : 2009-10-23 19:30
Updated : 2024-11-21 01:08
NVD link : CVE-2009-3766
Mitre link : CVE-2009-3766
CVE.ORG link : CVE-2009-3766
JSON object : View
Products Affected
mutt
- mutt
openssl
- openssl
CWE
CWE-310
Cryptographic Issues