CVE-2009-3639

The mod_tls module in ProFTPD before 1.3.2b, and 1.3.3 before 1.3.3rc2, when the dNSNameRequired TLS option is enabled, does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 client certificate, which allows remote attackers to bypass intended client-hostname restrictions via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.8 UNKNOWN
NETWORK
MEDIUM
AV:N/AC:M/Au:N/C:N/I:P/A:P
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 79%
VendorProductVersion
proftpdproftpd
𝑥
≤ 1.3.2
proftpdproftpd
1.3.1
proftpdproftpd
1.3.2
proftpdproftpd
1.3.2:rc1
proftpdproftpd
1.3.2:rc2
proftpdproftpd
1.3.2:rc4
proftpdproftpd
1.3.3:rc1
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
proftpd-dfsg
bullseye
1.3.7a+dfsg-12+deb11u2
fixed
bookworm
1.3.8+dfsg-4+deb12u3
fixed
trixie
1.3.8.b+dfsg-2
fixed
sid
1.3.8.b+dfsg-3
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
proftpd-dfsg
oneiric
not-affected
natty
not-affected
maverick
not-affected
lucid
not-affected
karmic
ignored
jaunty
ignored
intrepid
ignored
hardy
ignored
dapper
dne
Common Weakness Enumeration