CVE Reference: CVE-2009-2666

NOTE: The text on this page is written by CVE MITRE and reflects neither the opinions of Secunia or the results of our research. All data on this page is written and maintained by CVE MITRE.

Original Page at CVE MITRE:
CVE-2009-2666

Description:
socket.c in fetchmail before 6.3.11 does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.

CVE Status:
Candidate

References:

ST
  1022679

SLACKWARE
  http://www.slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.543463

SAID
  Secunia Advisory: SA36236
  Secunia Advisory: SA36179
  Secunia Advisory: SA36175

OVAL
  http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11059

OSVDB
  56855

MLIST
  http://marc.info/?l=oss-security&m=124949601207156&w=2

MANDRIVA
  http://www.mandriva.com/security/advisories?name=MDVSA-2009:201

DEBIAN
  http://www.debian.org/security/2009/dsa-1852

CONFIRM
  http://support.apple.com/kb/HT3937
  http://fetchmail.berlios.de/fetchmail-SA-2009-01.txt

BUGTRAQ
  http://www.securityfocus.com/archive/1/archive/1/505530/100/0/threaded

BID
  35951

APPLE
  http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html


Return to the previous page.