Description
ovirt-engine-sdk-python before 3.4.0.7 and 3.5.0.4 does not verify that the hostname of the remote endpoint matches the Common Name (CN) or subjectAltName as specified by its x.509 certificate in a TLS/SSL session. This could allow man-in-the-middle attackers to spoof remote endpoints via an arbitrary valid certificate.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-0124 | ovirt-engine-sdk-python before 3.4.0.7 and 3.5.0.4 does not verify that the hostname of the remote endpoint matches the Common Name (CN) or subjectAltName as specified by its x.509 certificate in a TLS/SSL session. This could allow man-in-the-middle attackers to spoof remote endpoints via an arbitrary valid certificate. |
Github GHSA |
GHSA-wf9j-m9fv-92gq | ovirt-engine-sdk-python improper validation of hostname in x.509 certificate |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T09:05:38.992Z
Reserved: 2013-12-03T00:00:00.000Z
Link: CVE-2014-0161
No data.
Status : Modified
Published: 2020-01-02T18:15:11.620
Modified: 2024-11-21T02:01:30.730
Link: CVE-2014-0161
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA