First published: Tue Oct 16 2012(Updated: )
Apache Commons HttpClient 3.x, as used in Amazon Flexible Payments Service (FPS) merchant Java SDK and other products, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jakarta-commons-httpclient | <1:3.1-2.1_patch_01.ep5.el5 | 1:3.1-2.1_patch_01.ep5.el5 |
redhat/jakarta-commons-httpclient | <1:3.1-2_patch_01.ep5.el6 | 1:3.1-2_patch_01.ep5.el6 |
redhat/jakarta-commons-httpclient | <1:3.1-0.7.el6_3 | 1:3.1-0.7.el6_3 |
redhat/jakarta-commons-httpclient | <1:3.1-2.1_patch_01.ep5.el4 | 1:3.1-2.1_patch_01.ep5.el4 |
redhat/redhat-support-plugin-rhev | <0:3.3.0-14.el6e | 0:3.3.0-14.el6e |
Apache HttpClient | =3.1 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =15.04 | |
IBM ISAM | <=9.0.7 | |
IBM Security Verify Access | <=10.0.0 | |
maven/commons-httpclient:commons-httpclient | >=3.0<4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2012-5783 is a vulnerability in Apache Commons HttpClient that could allow a remote attacker to conduct spoofing attacks.
Apache Commons HttpClient 3.x, Amazon Flexible Payments Service (FPS) merchant Java SDK, and other products are affected by CVE-2012-5783.
The severity of CVE-2012-5783 is medium, with a severity value of 5.8.
To fix CVE-2012-5783, update to the recommended patch version specified in the affected software section.
You can find more information about CVE-2012-5783 at the following references: [link1](https://access.redhat.com/security/cve/CVE-2012-5783), [link2](http://www.cs.utexas.edu/~shmat/shmat_ccs12.pdf), [link3](https://crypto.stanford.edu/~dabo/pubs/abstracts/ssl-client-bugs.html).