First published: Thu Aug 14 2014(Updated: )
Apache HttpComponents could allow a remote attacker to conduct spoofing attacks, caused by an incomplete fix related to the failure to verify that the server hostname matches a domain name in the Subject's Common Name (CN) or SubjectAltName field of certificates. By persuading a victim to visit a Web site containing a specially-crafted certificate, an attacker could exploit this vulnerability using man-in-the-middle techniques to spoof an SSL server.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jakarta-commons-httpclient | <1:3.1-4_patch_02.ep5.el5 | 1:3.1-4_patch_02.ep5.el5 |
redhat/jboss-seam2 | <0:2.2.6.EAP5-22_patch_01.ep5.el5 | 0:2.2.6.EAP5-22_patch_01.ep5.el5 |
redhat/apache-cxf | <0:2.2.12-14.patch_09.ep5.el5 | 0:2.2.12-14.patch_09.ep5.el5 |
redhat/jakarta-commons-httpclient | <1:3.1-4_patch_02.el6_5 | 1:3.1-4_patch_02.el6_5 |
redhat/jboss-seam2 | <0:2.2.6.EAP5-22_patch_01.el6 | 0:2.2.6.EAP5-22_patch_01.el6 |
redhat/apache-cxf | <0:2.2.12-14.patch_09.el6 | 0:2.2.12-14.patch_09.el6 |
redhat/devtoolset | <2-httpcomponents-client-0:4.2.1-6.el6 | 2-httpcomponents-client-0:4.2.1-6.el6 |
redhat/jakarta-commons-httpclient | <1:3.1-4_patch_02.ep5.el4 | 1:3.1-4_patch_02.ep5.el4 |
redhat/jboss-seam2 | <0:2.2.6.EAP5-22_patch_01.ep5.el4 | 0:2.2.6.EAP5-22_patch_01.ep5.el4 |
redhat/apache-cxf | <0:2.2.12-14.patch_09.ep5.el4 | 0:2.2.12-14.patch_09.ep5.el4 |
redhat/httpcomponents-eap6 | <0:6-12.redhat_2.1.ep6.el5 | 0:6-12.redhat_2.1.ep6.el5 |
redhat/apache-cxf | <0:2.7.12-1.SP1_redhat_5.1.ep6.el5 | 0:2.7.12-1.SP1_redhat_5.1.ep6.el5 |
redhat/wss4j | <0:1.6.16-2.redhat_3.1.ep6.el5 | 0:1.6.16-2.redhat_3.1.ep6.el5 |
redhat/httpcomponents-eap6 | <0:6-12.redhat_2.1.ep6.el6 | 0:6-12.redhat_2.1.ep6.el6 |
redhat/apache-cxf | <0:2.7.12-1.SP1_redhat_5.1.ep6.el6 | 0:2.7.12-1.SP1_redhat_5.1.ep6.el6 |
redhat/wss4j | <0:1.6.16-2.redhat_3.1.ep6.el6 | 0:1.6.16-2.redhat_3.1.ep6.el6 |
redhat/httpcomponents-eap6 | <0:6-12.redhat_2.1.ep6.el7 | 0:6-12.redhat_2.1.ep6.el7 |
redhat/apache-cxf | <0:2.7.12-1.SP1_redhat_5.1.ep6.el7 | 0:2.7.12-1.SP1_redhat_5.1.ep6.el7 |
redhat/wss4j | <0:1.6.16-2.redhat_3.1.ep6.el7 | 0:1.6.16-2.redhat_3.1.ep6.el7 |
redhat/httpcomponents-client | <4.2.3 | 4.2.3 |
Apache Commons-httpclient | >=4.0<=4.2.2 | |
IBM ISAM | <=9.0.7 | |
IBM Security Verify Access | <=10.0.0 | |
maven/org.apache.httpcomponents:httpclient | <4.2.3 | 4.2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The vulnerability ID of this issue is CVE-2012-6153.
The severity of CVE-2012-6153 is high with a score of 4.3.
The affected software includes jakarta-commons-httpclient, jboss-seam2, apache-cxf, devtoolset, httpcomponents-client, Apache Commons-httpclient, IBM ISAM, and IBM Security Verify Access.
There is no specific fix mentioned in the provided information, but it is recommended to update to the latest version of the affected software.
You can find more information about CVE-2012-6153 on CVE website (https://www.cve.org/CVERecord?id=CVE-2012-6153) and NVD website (https://nvd.nist.gov/vuln/detail/CVE-2012-6153).