First published: Fri Nov 01 2013(Updated: )
libgadu before 1.12.0 does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
CentOS Libgcc | <=1.11.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-4488 has a medium severity rating due to its potential to allow man-in-the-middle attacks.
To fix CVE-2013-4488, upgrade libgadu to version 1.12.0 or later, which includes proper SSL certificate validation.
CVE-2013-4488 exploits the lack of verification of X.509 certificates from SSL servers in vulnerable versions of libgadu.
All versions of libgadu prior to 1.12.0 are affected by CVE-2013-4488.
Libgadu utilizes the e-mail communication protocol, which is compromised in the context of CVE-2013-4488 due to SSL certificate validation issues.