First published: Sun Apr 07 2013(Updated: )
The installation functionality in the Novell Kanaka component before 2.8 for Novell Open Enterprise Server (OES) on Mac OS X does not verify the server's X.509 certificate during an SSL session, which allows man-in-the-middle attackers to spoof servers via an arbitrary certificate.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Novell Kanaka | <=2.7.1 | |
Novell Kanaka | =2.7 | |
SUSE Open Enterprise Server |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-2770 is classified as a medium severity vulnerability due to its potential for man-in-the-middle attacks.
To fix CVE-2013-2770, update to Novell Kanaka version 2.8 or later which includes proper server certificate validation.
CVE-2013-2770 affects Novell Kanaka versions prior to 2.8 on Mac OS X.
CVE-2013-2770 allows man-in-the-middle attackers to spoof servers using arbitrary certificates.
CVE-2013-2770 does not affect the SUSE Open Enterprise Server versions.