5.8
CVSSv2

CVE-2009-3639

Published: 28/10/2009 Updated: 17/08/2017
CVSS v2 Base Score: 5.8 | Impact Score: 4.9 | Exploitability Score: 8.6
VMScore: 518
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:P

Vulnerability Summary

The mod_tls module in ProFTPD prior to 1.3.2b, and 1.3.3 prior to 1.3.3rc2, when the dNSNameRequired TLS option is enabled, does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 client certificate, which allows remote malicious users to bypass intended client-hostname restrictions via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.

Vulnerable Product Search on Vulmon Subscribe to Product

proftpd proftpd

proftpd proftpd 1.3.3

proftpd proftpd 1.3.2

proftpd proftpd 1.3.1

Vendor Advisories

It has been discovered that proftpd-dfsg, a virtual-hosting FTP daemon, does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X509 client certificate, when the dNSNameRequired TLS option is enabled For the stable distribution (lenny), this problem has been fixed in version 131-17lenny4 For the o ...