Lucene search

K
freebsdFreeBSD5FEE3F02-DE37-11E4-B7C3-001999F8D30B
HistoryApr 04, 2015 - 12:00 a.m.

asterisk -- TLS Certificate Common name NULL byte exploit

2015-04-0400:00:00
vuxml.freebsd.org
18

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.905 High

EPSS

Percentile

98.8%

The Asterisk project reports:

When Asterisk registers to a SIP TLS device and and
verifies the server, Asterisk will accept signed certificates
that match a common name other than the one Asterisk is
expecting if the signed certificate has a common name
containing a null byte after the portion of the common
name that Asterisk expected. For example, if Asterisk is
trying to register to www.domain.com, Asterisk will accept
certificates of the form
www.domain.com\x00www.someotherdomain.com

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchasterisk< 1.8.32.3UNKNOWN
FreeBSDanynoarchasterisk11< 11.17.1UNKNOWN
FreeBSDanynoarchasterisk13< 13.3.2UNKNOWN

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.905 High

EPSS

Percentile

98.8%