First published: Tue May 21 2013(Updated: )
telepathy-idle before 0.1.15 does not verify (1) that the issuer is a trusted CA, (2) that the server hostname matches a domain name in the subject's Common Name (CN), or (3) the expiration date of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
canonical telepathy-idle | <=0.1.14.1 | |
canonical telepathy-idle | =0.1.10.1 | |
canonical telepathy-idle | =0.1.11.1 | |
canonical telepathy-idle | =0.1.11.2 | |
canonical telepathy-idle | =0.1.12.1 | |
canonical telepathy-idle | =0.1.14 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =12.10 | |
Ubuntu Linux | =13.04 | |
Ubuntu | =13.04 | |
Ubuntu | =12.10 | |
Ubuntu | =12.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-6746 is classified as a high severity vulnerability due to the risk of man-in-the-middle attacks.
To fix CVE-2007-6746, update telepathy-idle to version 0.1.15 or later, which includes the necessary certificate validation improvements.
CVE-2007-6746 affects telepathy-idle versions earlier than 0.1.15, as well as certain Ubuntu Linux versions that include these vulnerable telepathy-idle packages.
CVE-2007-6746 allows man-in-the-middle attackers to spoof SSL servers by exploiting improper certificate validation.
Yes, CVE-2007-6746 poses a risk of data breach, as attackers can intercept and manipulate sensitive communications.