exploit the possibilities

Apache Libcloud 0.11.1 Possible Man In The Middle

Apache Libcloud 0.11.1 Possible Man In The Middle
Posted Aug 3, 2012
Authored by Suman Jana, Vitaly Shmatikov, Martin Georgiev | Site libcloud.apache.org

Apache Libcloud versions 0.4.2 through 0.11.1 suffer from a possible man-in-the-middle condition. When establishing a secure (SSL / TLS) connection to a target server an invalid regular expression has been used for performing the hostname verification. Subset instead of the full target server hostname has been marked as an acceptable match for the given hostname.

tags | advisory
advisories | CVE-2012-3446
MD5 | 24bc72c0224f57e8d361ca64a9846287

Apache Libcloud 0.11.1 Possible Man In The Middle

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

CVE-2012-3446: Apache Libcloud - possible MITM due to invalid regular
expression used to validate the target server hostname

Severity: Medium

Vendor:

The Apache Software Foundation

Versions Affected:

Apache Libcloud 0.4.2 to 0.11.1

Versions prior to 0.4.2 don't perform any target server SSL certificate
validation.

Description:

When establishing a secure (SSL / TLS) connection to a target server an
invalid regular expression has been used for performing the hostname
verification. Subset instead of the full target server hostname has been
marked an an acceptable match for the given hostname.

For example, certificate with a hostname field of "aexample.com" was
considered
a valid certificate for domain "example.com".

Mitigation:

Users should upgrade to the latest version (0.11.1) which includes a fix.

Credit:

This issue was discovered by researchers from the University of Texas at
Austin
(Martin Georgiev, Suman Jana and Vitaly Shmatikov).

References:

http://libcloud.apache.org/security.html
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
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=U7hz
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

September 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    14 Files
  • 2
    Sep 2nd
    19 Files
  • 3
    Sep 3rd
    9 Files
  • 4
    Sep 4th
    1 Files
  • 5
    Sep 5th
    2 Files
  • 6
    Sep 6th
    3 Files
  • 7
    Sep 7th
    12 Files
  • 8
    Sep 8th
    22 Files
  • 9
    Sep 9th
    17 Files
  • 10
    Sep 10th
    19 Files
  • 11
    Sep 11th
    3 Files
  • 12
    Sep 12th
    2 Files
  • 13
    Sep 13th
    15 Files
  • 14
    Sep 14th
    16 Files
  • 15
    Sep 15th
    15 Files
  • 16
    Sep 16th
    7 Files
  • 17
    Sep 17th
    13 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close