CVE-2014-3596

Related Vulnerabilities: CVE-2014-3596  

It was discovered that Axis incorrectly extracted the host name from an X.509 certificate subject's Common Name (CN) field. A man-in-the-middle attacker could use this flaw to spoof an SSL server using a specially crafted X.509 certificate.

It was discovered that Axis incorrectly extracted the host name from an X.509 certificate subject's Common Name (CN) field. A man-in-the-middle attacker could use this flaw to spoof an SSL server using a specially crafted X.509 certificate.

Find out more about CVE-2014-3596 from the MITRE CVE dictionary dictionary and NIST NVD.

Statement

Note that Axis 1 is EOL upstream, and the incomplete patch for CVE-2012-5784 was never merged upstream. It was, however, shipped by various vendors, including Debian and Red Hat. Additional information can be found in the Red Hat Knowledgebase article: https://access.redhat.com/solutions/1164433

CVSS v2 metrics

Base Score 5.8
Base Metrics AV:N/AC:M/Au:N/C:P/I:P/A:N
Access Vector Network
Access Complexity Medium
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact None

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux 5 (axis) RHSA-2014:1193 2014-09-15
Red Hat Enterprise Linux 6 (axis) RHSA-2014:1193 2014-09-15

Affected Packages State

Platform Package State
Red Hat JBoss Portal Platform 6 axis Affected
Red Hat JBoss Portal 5 axis Affected
RHEV Manager 3 jasperreports-server-pro Affected

Acknowledgements

This issue was discovered by David Jorm and Arun Neelicattu of Red Hat Product Security.