CVE-2014-3577
Publication date 21 August 2014
Last updated 24 July 2024
Ubuntu priority
org.apache.http.conn.ssl.AbstractVerifier in Apache HttpComponents HttpClient before 4.3.5 and HttpAsyncClient before 4.0.2 does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a "CN=" string in a field in the distinguished name (DN) of a certificate, as demonstrated by the "foo,CN=www.apache.org" string in the O field.
From the Ubuntu Security Team
Subodh Iyengar and Will Shackleton discovered the fix for CVE-2012-5783 was incomplete for Apache Commons HttpClient. An attacker could exploit this to perform a man in the middle attack to view sensitive information or alter encrypted communications.
Status
Package | Ubuntu Release | Status |
---|---|---|
commons-httpclient | 18.04 LTS bionic |
Not affected
|
16.04 LTS xenial |
Not affected
|
|
14.04 LTS trusty |
Fixed 3.1-10.2ubuntu0.14.04.1
|
|
httpcomponents-client | 18.04 LTS bionic |
Not affected
|
16.04 LTS xenial |
Not affected
|
|
14.04 LTS trusty |
Fixed 4.3.3-1ubuntu0.1
|
|
Patch details
Package | Patch details |
---|---|
httpcomponents-client |
References
Related Ubuntu Security Notices (USN)
- USN-2769-1
- Apache Commons HttpClient vulnerabilities
- 14 October 2015