Lucene search

K
amazonAmazonALAS-2014-412
HistorySep 17, 2014 - 9:47 p.m.

Important: axis

2014-09-1721:47:00
alas.aws.amazon.com
13

5.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

0.001 Low

EPSS

Percentile

42.2%

Issue Overview:

It was discovered that Axis incorrectly extracted the host name from an X.509 certificate subject’s Common Name (CN) field. A man-in-the-middle attacker could use this flaw to spoof an SSL server using a specially crafted X.509 certificate. (CVE-2014-3596)

Affected Packages:

axis

Issue Correction:
Run yum update axis to update your system.

New Packages:

noarch:  
Β Β Β  axis-1.2.1-7.5.14.amzn1.noarch  
Β Β Β  axis-javadoc-1.2.1-7.5.14.amzn1.noarch  
Β Β Β  axis-manual-1.2.1-7.5.14.amzn1.noarch  
  
src:  
Β Β Β  axis-1.2.1-7.5.14.amzn1.src  

Additional References

Red Hat: CVE-2014-3596

Mitre: CVE-2014-3596

5.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

0.001 Low

EPSS

Percentile

42.2%