CVE-2014-3596

Impact:
Important
Public Date:
2014-08-19
CWE:
CWE-297
Bugzilla:
1129935: CVE-2014-3596 axis: SSL hostname verification bypass, incomplete CVE-2012-5784 fix
It was discovered that Axis incorrectly extracted the host name from an X.509 certificate subject's Common Name (CN) field. A man-in-the-middle attacker could use this flaw to spoof an SSL server using a specially crafted X.509 certificate.

Find out more about CVE-2014-3596 from the MITRE CVE dictionary dictionary and NIST NVD.

Statement

Note that Axis 1 is EOL upstream, and the incomplete patch for CVE-2012-5784 was never merged upstream. It was, however, shipped by various vendors, including Debian and Red Hat. Additional information can be found in the Red Hat Knowledgebase article: https://access.redhat.com/solutions/1164433

CVSS v2 metrics

Base Score 5.8
Base Metrics AV:N/AC:M/Au:N/C:P/I:P/A:N
Access Vector Network
Access Complexity Medium
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact None

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat JBoss Portal 6.2 RHSA-2015:1010 2015-05-14
Red Hat Enterprise Linux 5 (axis) RHSA-2014:1193 2014-09-15
Red Hat Enterprise Linux 6 (axis) RHSA-2014:1193 2014-09-15

Affected Packages State

Platform Package State
Red Hat JBoss Portal 5 axis Affected
RHEV Manager 3 jasperreports-server-pro Affected

Acknowledgements

This issue was discovered by David Jorm and Arun Neelicattu of Red Hat Product Security.

Last Modified
Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.