First published: Fri Oct 23 2009(Updated: )
libraries/libldap/tls_o.c in OpenLDAP 2.2 and 2.4, and possibly other versions, when OpenSSL is used, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iOS and macOS | <10.6.2 | |
Fedora | =11 | |
Red Hat OpenLDAP Servers | <2.4.18 | |
OpenSSL |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2009-3767 is classified as medium, allowing for man-in-the-middle attacks due to improper handling of a '\0' character.
To fix CVE-2009-3767, users should upgrade to OpenLDAP version 2.4.18 or later.
CVE-2009-3767 affects OpenLDAP versions 2.2 and 2.4, as well as certain versions of macOS and Fedora.
CVE-2009-3767 facilitates man-in-the-middle attacks allowing attackers to spoof SSL servers.
No, OpenSSL itself is not directly vulnerable as part of CVE-2009-3767, but it is related to the issue with OpenLDAP.