Description
DefaultHostnameVerifier in Ldaptive (formerly vt-ldap) does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-1923 | DefaultHostnameVerifier in Ldaptive (formerly vt-ldap) does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate. |
Github GHSA |
GHSA-273v-g3x4-r3rc | Improper Certificate Validation in vt-ldap |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T10:50:17.581Z
Reserved: 2014-05-14T00:00:00.000Z
Link: CVE-2014-3607
No data.
Status : Modified
Published: 2018-01-08T19:29:00.407
Modified: 2024-11-21T02:08:29.563
Link: CVE-2014-3607
OpenCVE Enrichment
No data.
EUVD
Github GHSA