lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Date: Wed, 1 Aug 2012 23:53:32 -0700
From: Tomaž Muraus <tomaz@...che.org>
To: full-disclosure@...ts.grok.org.uk, bugtraq@...urityfocus.com
Subject: [CVE-2012-3446] Apache Libcloud - possible SSL
 MITM due to invalid regular expression used to validate the target server
 hostname

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

CVE-2012-3446: Apache Libcloud - possible MITM due to invalid regular
expression used to validate the target server hostname

Severity: Medium

Vendor:

The Apache Software Foundation

Versions Affected:

Apache Libcloud 0.4.2 to 0.11.1

Versions prior to 0.4.2 don't perform any target server SSL certificate
validation.

Description:

When establishing a secure (SSL / TLS) connection to a target server an
invalid regular expression has been used for performing the hostname
verification. Subset instead of the full target server hostname has been
marked an an acceptable match for the given hostname.

For example, certificate with a hostname field of "aexample.com" was
considered
a valid certificate for domain "example.com".

Mitigation:

Users should upgrade to the latest version (0.11.1) which includes a fix.

Credit:

This issue was discovered by researchers from the University of Texas at
Austin
(Martin Georgiev, Suman Jana and Vitaly Shmatikov).

References:

http://libcloud.apache.org/security.html
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
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=U7hz
-----END PGP SIGNATURE-----

Content of type "text/html" skipped

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ