CVE-2014-3596
27.08.2014, 00:55
The getCN function in Apache Axis 1.4 and earlier does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a certificate with a subject that specifies a common name in a field that is not the CN field. NOTE: this issue exists because of an incomplete fix for CVE-2012-5784.Enginsight
Vendor | Product | Version |
---|---|---|
apache | axis | 𝑥 ≤ 1.4 |
apache | axis | 1.0 |
apache | axis | 1.0:beta |
apache | axis | 1.0:rc1 |
apache | axis | 1.0:rc2 |
apache | axis | 1.1 |
apache | axis | 1.1:beta |
apache | axis | 1.1:rc1 |
apache | axis | 1.1:rc2 |
apache | axis | 1.2 |
apache | axis | 1.2:alpha |
apache | axis | 1.2:beta1 |
apache | axis | 1.2:beta2 |
apache | axis | 1.2:beta3 |
apache | axis | 1.2:rc1 |
apache | axis | 1.2:rc2 |
apache | axis | 1.2:rc3 |
apache | axis | 1.2.1 |
apache | axis | 1.3 |
𝑥
= Vulnerable software versions

Debian Releases
References