4.3
CVSSv2

CVE-2009-3767

Published: 23/10/2009 Updated: 14/10/2020
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

libraries/libldap/tls_o.c in OpenLDAP 2.2 and 2.4, and possibly other versions, when OpenSSL is used, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle malicious users to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

openldap openldap

apple mac os x

fedoraproject fedora 11

Vendor Advisories

Debian Bug report logs - #553432 CVE-2009-3767: Doesn't properly handle NULL character in subject Common Name Package: openldap; Maintainer for openldap is Debian OpenLDAP Maintainers <pkg-openldap-devel@listsaliothdebianorg>; Reported by: Giuseppe Iuculano <iuculano@debianorg> Date: Sat, 31 Oct 2009 10:00:01 UTC ...
It was discovered that OpenLDAP did not correctly handle SSL certificates with zero bytes in the Common Name A remote attacker could exploit this to perform a man in the middle attack to view sensitive information or alter encrypted communications ...
Synopsis Moderate: openldap security and bug fix update Type/Severity Security Advisory: Moderate Topic Updated openldap packages that fix one security issue and several bugs arenow available for Red Hat Enterprise Linux 5The Red Hat Security Response Team has rated this update as having moderatesecurity i ...
Synopsis Moderate: openldap security update Type/Severity Security Advisory: Moderate Topic Updated openldap packages that fix two security issues are now availablefor Red Hat Enterprise Linux 4The Red Hat Security Response Team has rated this update as having moderatesecurity impact Common Vulnerability ...
It was discovered that OpenLDAP, a free implementation of the Lightweight Directory Access Protocol, when OpenSSL is used, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issue ...