5.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:P/A:N
0.004 Low
EPSS
Percentile
74.4%
CentOS Errata and Security Advisory CESA-2014:1166
Jakarta Commons HTTPClient implements the client side of HTTP standards.
It was discovered that the HTTPClient incorrectly extracted host name from
an X.509 certificate subject’s Common Name (CN) field. A man-in-the-middle
attacker could use this flaw to spoof an SSL server using a specially
crafted X.509 certificate. (CVE-2014-3577)
For additional information on this flaw, refer to the Knowledgebase
article in the References section.
All jakarta-commons-httpclient users are advised to upgrade to these
updated packages, which contain a backported patch to correct this issue.
Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2014-September/082706.html
https://lists.centos.org/pipermail/centos-announce/2014-September/082707.html
https://lists.centos.org/pipermail/centos-announce/2014-September/082708.html
Affected packages:
jakarta-commons-httpclient
jakarta-commons-httpclient-demo
jakarta-commons-httpclient-javadoc
jakarta-commons-httpclient-manual
Upstream details at:
https://access.redhat.com/errata/RHSA-2014:1166