CVE-2013-1909

Impact:
Moderate
Public Date:
2013-06-13
Bugzilla:
928530: CVE-2013-1909 python-qpid: client does not validate qpid server TLS/SSL certificate

The MITRE CVE dictionary describes this issue as:

The Python client in Apache Qpid before 2.2 does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.

Find out more about CVE-2013-1909 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v2 metrics

Base Score 4.3
Base Metrics AV:N/AC:M/Au:N/C:N/I:P/A:N
Access Vector Network
Access Complexity Medium
Authentication None
Confidentiality Impact None
Integrity Impact Partial
Availability Impact None

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat MRG Grid for RHEL 6 Server v.2 (python-qpid) RHSA-2013:1024 2013-07-11
Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2 (python-qpid) RHSA-2013:1024 2013-07-11

Affected Packages State

Platform Package State
Red Hat Satellite 6 python-qpid Not affected
Red Hat Enterprise Linux 6 python-qpid Fix deferred
Red Hat CloudForms Tools 1 python-qpid Will not fix

Acknowledgements

This issue was discovered by Petr Matousek of the Red Hat MRG Messaging team.

External References

Last Modified

CVE description copyright © 2017, The MITRE Corporation

Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.