ID |
CVE-2009-3766
|
Summary |
mutt_ssl.c in mutt 1.5.16 and other versions before 1.5.19, when OpenSSL is used, does not verify the domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate. |
References |
|
Vulnerable Configurations |
-
cpe:2.3:a:mutt:mutt:1.5.16:*:*:*:*:*:*:*
cpe:2.3:a:mutt:mutt:1.5.16:*:*:*:*:*:*:*
-
cpe:2.3:a:mutt:mutt:1.5.17:*:*:*:*:*:*:*
cpe:2.3:a:mutt:mutt:1.5.17:*:*:*:*:*:*:*
-
cpe:2.3:a:mutt:mutt:1.5.18:*:*:*:*:*:*:*
cpe:2.3:a:mutt:mutt:1.5.18:*:*:*:*:*:*:*
-
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*
|
CVSS |
Base: | 6.8 (as of 07-11-2019 - 15:35) |
Impact: | |
Exploitability: | |
|
CWE |
CWE-310 |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
NETWORK |
MEDIUM |
NONE |
|
Impact |
Confidentiality | Integrity | Availability |
PARTIAL |
PARTIAL |
PARTIAL |
|
cvss-vector
via4
|
AV:N/AC:M/Au:N/C:P/I:P/A:P
|
refmap
via4
|
|
statements
via4
|
contributor | Tomas Hoger | lastmodified | 2009-11-26 | organization | Red Hat | statement | Red Hat is aware of this issue and is tracking it via the following bug:
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2009-3766
The Red Hat Security Response Team has rated this issue as having moderate security impact, a future update may address this flaw. |
|
Last major update |
07-11-2019 - 15:35 |
Published |
23-10-2009 - 19:30 |
Last modified |
07-11-2019 - 15:35 |