CVE-2014-3504

The (1) serf_ssl_cert_issuer, (2) serf_ssl_cert_subject, and (3) serf_ssl_cert_certificate functions in Serf 0.2.0 through 1.3.x before 1.3.7 does not properly handle a NUL byte in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apache:subversion:1.4.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.4.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.4.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.4.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.4.4:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.4.5:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.4.6:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.5.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.5.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.5.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.5.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.5.4:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.5.5:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.5.6:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.5.7:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.5.8:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.4:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.5:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.6:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.7:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.8:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.9:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.10:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.11:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.12:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.13:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.14:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.15:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.16:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.17:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.18:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.19:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.20:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.21:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.23:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.7.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.7.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.7.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.7.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.7.4:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.7.5:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.7.6:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.7.7:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.7.8:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.7.9:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.7.10:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.7.11:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.7.12:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.7.13:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.7.14:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.7.15:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.7.16:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.7.17:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.8.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.8.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.8.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.8.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.8.4:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.8.5:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.8.6:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.8.7:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.8.8:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.8.9:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:serf_project:serf:0.2.0:*:*:*:*:*:*:*
cpe:2.3:a:serf_project:serf:0.3.0:*:*:*:*:*:*:*
cpe:2.3:a:serf_project:serf:0.3.1:*:*:*:*:*:*:*
cpe:2.3:a:serf_project:serf:0.4.0:*:*:*:*:*:*:*
cpe:2.3:a:serf_project:serf:0.5.0:*:*:*:*:*:*:*
cpe:2.3:a:serf_project:serf:0.6.0:*:*:*:*:*:*:*
cpe:2.3:a:serf_project:serf:0.6.1:*:*:*:*:*:*:*
cpe:2.3:a:serf_project:serf:0.7.0:*:*:*:*:*:*:*
cpe:2.3:a:serf_project:serf:0.7.1:*:*:*:*:*:*:*
cpe:2.3:a:serf_project:serf:0.7.2:*:*:*:*:*:*:*
cpe:2.3:a:serf_project:serf:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:serf_project:serf:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:serf_project:serf:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:serf_project:serf:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:serf_project:serf:1.1.0:*:*:*:*:*:*:*
cpe:2.3:a:serf_project:serf:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:serf_project:serf:1.2.0:*:*:*:*:*:*:*
cpe:2.3:a:serf_project:serf:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:serf_project:serf:1.3.0:*:*:*:*:*:*:*
cpe:2.3:a:serf_project:serf:1.3.1:*:*:*:*:*:*:*
cpe:2.3:a:serf_project:serf:1.3.2:*:*:*:*:*:*:*
cpe:2.3:a:serf_project:serf:1.3.3:*:*:*:*:*:*:*
cpe:2.3:a:serf_project:serf:1.3.4:*:*:*:*:*:*:*
cpe:2.3:a:serf_project:serf:1.3.5:*:*:*:*:*:*:*
cpe:2.3:a:serf_project:serf:1.3.6:*:*:*:*:*:*:*

History

21 Nov 2024, 02:08

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-updates/2014-08/msg00038.html - () http://lists.opensuse.org/opensuse-updates/2014-08/msg00038.html -
References () http://secunia.com/advisories/59584 - () http://secunia.com/advisories/59584 -
References () http://secunia.com/advisories/60721 - () http://secunia.com/advisories/60721 -
References () http://ubuntu.com/usn/usn-2315-1 - Vendor Advisory () http://ubuntu.com/usn/usn-2315-1 - Vendor Advisory
References () http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html - () http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -
References () http://www.securityfocus.com/bid/69238 - () http://www.securityfocus.com/bid/69238 -
References () https://groups.google.com/forum/#%21topic/serf-dev/NvgPoK6sFsc - () https://groups.google.com/forum/#%21topic/serf-dev/NvgPoK6sFsc -
References () https://security.gentoo.org/glsa/201610-05 - () https://security.gentoo.org/glsa/201610-05 -
References () https://subversion.apache.org/security/CVE-2014-3522-advisory.txt - Vendor Advisory () https://subversion.apache.org/security/CVE-2014-3522-advisory.txt - Vendor Advisory

07 Nov 2023, 02:20

Type Values Removed Values Added
References
  • {'url': 'https://groups.google.com/forum/#!topic/serf-dev/NvgPoK6sFsc', 'name': 'https://groups.google.com/forum/#!topic/serf-dev/NvgPoK6sFsc', 'tags': [], 'refsource': 'CONFIRM'}
  • () https://groups.google.com/forum/#%21topic/serf-dev/NvgPoK6sFsc -

Information

Published : 2014-08-19 18:55

Updated : 2024-11-21 02:08


NVD link : CVE-2014-3504

Mitre link : CVE-2014-3504

CVE.ORG link : CVE-2014-3504


JSON object : View

Products Affected

canonical

  • ubuntu_linux

apache

  • subversion

serf_project

  • serf