6.8
CVSSv2

CVE-2010-1192

Published: 31/03/2010 Updated: 22/05/2010
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

libESMTP, probably 1.0.4 and previous versions, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle malicious users to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

stafford.uklinux libesmtp 1.0.2

stafford.uklinux libesmtp 1.0.1

stafford.uklinux libesmtp 0.8.9

stafford.uklinux libesmtp 0.8.8

stafford.uklinux libesmtp 0.8.0

stafford.uklinux libesmtp 0.7.1

stafford.uklinux libesmtp 0.3

stafford.uklinux libesmtp 0.2

stafford.uklinux libesmtp 0.8.12

stafford.uklinux libesmtp 0.8.11

stafford.uklinux libesmtp 0.8.4

stafford.uklinux libesmtp 0.8.3

stafford.uklinux libesmtp 0.6

stafford.uklinux libesmtp 1.0

stafford.uklinux libesmtp 0.8.7

stafford.uklinux libesmtp 0.8.6

stafford.uklinux libesmtp 0.8.5

stafford.uklinux libesmtp 0.7.0

stafford.uklinux libesmtp 0.6.1

stafford.uklinux libesmtp 0.1

stafford.uklinux libesmtp

stafford.uklinux libesmtp 1.0.3

stafford.uklinux libesmtp 0.8.10

stafford.uklinux libesmtp 0.8.2

stafford.uklinux libesmtp 0.8.1

stafford.uklinux libesmtp 0.5

stafford.uklinux libesmtp 0.4

Vendor Advisories

Debian Bug report logs - #572960 libesmtp does not check NULL bytes in commonNames of certificates Package: libesmtp; Maintainer for libesmtp is Jeremy T Bouse <jbouse@debianorg>; Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Sun, 7 Mar 2010 20:27:01 UTC Severity: grave Tags: security, upstream Fixed in ...