CVE-2014-3596

The getCN function in Apache Axis 1.4 and earlier does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a certificate with a subject that specifies a common name in a field that is not the CN field. NOTE: this issue exists because of an incomplete fix for CVE-2012-5784.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.8 UNKNOWN
NETWORK
MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:N
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 78%
VendorProductVersion
apacheaxis
𝑥
≤ 1.4
apacheaxis
1.0
apacheaxis
1.0:beta
apacheaxis
1.0:rc1
apacheaxis
1.0:rc2
apacheaxis
1.1
apacheaxis
1.1:beta
apacheaxis
1.1:rc1
apacheaxis
1.1:rc2
apacheaxis
1.2
apacheaxis
1.2:alpha
apacheaxis
1.2:beta1
apacheaxis
1.2:beta2
apacheaxis
1.2:beta3
apacheaxis
1.2:rc1
apacheaxis
1.2:rc2
apacheaxis
1.2:rc3
apacheaxis
1.2.1
apacheaxis
1.3
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
axis
bullseye
1.4-28+deb11u1
fixed
squeeze
no-dsa
bookworm
1.4-28+deb12u1
fixed
sid
1.4-29
fixed
trixie
1.4-29
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
axis
trusty
dne
precise
not-affected
lucid
ignored
References