Lucene search

K
amazonAmazonALAS-2014-397
HistorySep 03, 2014 - 2:37 p.m.

Medium: libserf

2014-09-0314:37:00
alas.aws.amazon.com
17

4 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:H/Au:N/C:P/I:P/A:N

0.001 Low

EPSS

Percentile

30.7%

Issue Overview:

The (1) serf_ssl_cert_issuer, (2) serf_ssl_cert_subject, and (3) serf_ssl_cert_certificate functions in Serf 0.2.0 through 1.3.x before 1.3.7 does not properly handle a NUL byte in a domain name in the subject’s Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.

Affected Packages:

libserf

Issue Correction:
Run yum update libserf to update your system.

New Packages:

i686:  
    libserf-debuginfo-1.3.7-1.6.amzn1.i686  
    libserf-devel-1.3.7-1.6.amzn1.i686  
    libserf-1.3.7-1.6.amzn1.i686  
  
src:  
    libserf-1.3.7-1.6.amzn1.src  
  
x86_64:  
    libserf-1.3.7-1.6.amzn1.x86_64  
    libserf-devel-1.3.7-1.6.amzn1.x86_64  
    libserf-debuginfo-1.3.7-1.6.amzn1.x86_64  

Additional References

Red Hat: CVE-2014-3504

Mitre: CVE-2014-3504

4 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:H/Au:N/C:P/I:P/A:N

0.001 Low

EPSS

Percentile

30.7%