5.8
CVSSv2

CVE-2014-3596

Published: 27/08/2014 Updated: 13/02/2023
CVSS v2 Base Score: 5.8 | Impact Score: 4.9 | Exploitability Score: 8.6
VMScore: 516
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N

Vulnerability Summary

The getCN function in Apache Axis 1.4 and previous versions does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle malicious users to spoof SSL servers via a certificate with a subject that specifies a common name in a field that is not the CN field. NOTE: this issue exists because of an incomplete fix for CVE-2012-5784.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache axis 1.0

apache axis 1.1

apache axis 1.2

apache axis 1.2.1

apache axis

apache axis 1.3

Vendor Advisories

Debian Bug report logs - #762444 Insecure certificate validation CVE-2014-3596 Package: axis; Maintainer for axis is Debian Java Maintainers <pkg-java-maintainers@listsaliothdebianorg>; Reported by: Raphael Hertzog <hertzog@debianorg> Date: Mon, 22 Sep 2014 12:03:02 UTC Severity: grave Tags: patch, security Fixe ...
It was discovered that Axis incorrectly extracted the host name from an X509 certificate subject's Common Name (CN) field A man-in-the-middle attacker could use this flaw to spoof an SSL server using a specially crafted X509 certificate (CVE-2014-3596) ...
It was discovered that Axis incorrectly extracted the host name from an X509 certificate subject's Common Name (CN) field A man-in-the-middle attacker could use this flaw to spoof an SSL server using a specially crafted X509 certificate ...