Your submission was sent successfully! Close

CVE-2012-6153

Published: 4 September 2014

http/conn/ssl/AbstractVerifier.java in Apache Commons HttpClient before 4.2.3 does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a certificate with a subject that specifies a common name in a field that is not the CN field. NOTE: this issue exists because of an incomplete fix for CVE-2012-5783.

Notes

AuthorNote
mdeslaur
debian's 06_fix_CVE-2012-5783.patch already contains the fix for
CVE-2012-6153
Priority

Low

Status

Package Release Status
commons-httpclient
Launchpad, Ubuntu, Debian
lucid Ignored
(reached end-of-life)
precise Does not exist
(precise was released [3.1-10ubuntu0.1])
trusty Not vulnerable
(3.1-10.2)
upstream
Released (3.1-10.2)
utopic Not vulnerable
(3.1-10.2)
vivid Not vulnerable
(3.1-10.2)
wily Not vulnerable
(3.1-10.2)
xenial Not vulnerable
(3.1-10.2)
yakkety Not vulnerable
(3.1-10.2)
zesty Not vulnerable
(3.1-10.2)
Patches:
upstream: http://svn.apache.org/viewvc?view=revision&revision=1411705

httpcomponents-client
Launchpad, Ubuntu, Debian
precise Does not exist
(precise was needed)
trusty Not vulnerable
(4.3.3-1)
upstream Needs triage

vivid Not vulnerable
(4.3.5-2)
wily Not vulnerable
(4.4.1-1)
xenial Not vulnerable
(4.4.1-1)
yakkety Not vulnerable
(4.4.1-1)
zesty Not vulnerable
(4.4.1-1)
Patches:

upstream: http://svn.apache.org/viewvc?view=revision&revision=1411705