First published: Wed Feb 06 2013(Updated: )
Common Vulnerabilities and Exposures assigned an identifier <a href="https://access.redhat.com/security/cve/CVE-2014-0363">CVE-2014-0363</a> to the following vulnerability: Name: <a href="https://access.redhat.com/security/cve/CVE-2014-0363">CVE-2014-0363</a> URL: <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0363">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0363</a> Assigned: 20131205 Reference: <a href="http://community.igniterealtime.org/blogs/ignite/2014/04/17/asmack-400-rc1-has-been-released">http://community.igniterealtime.org/blogs/ignite/2014/04/17/asmack-400-rc1-has-been-released</a> Reference: <a href="http://issues.igniterealtime.org/browse/SMACK-410">http://issues.igniterealtime.org/browse/SMACK-410</a> Reference: CERT-VN:VU#489228 Reference: <a href="http://www.kb.cert.org/vuls/id/489228">http://www.kb.cert.org/vuls/id/489228</a> The ServerTrustManager component in the Ignite Realtime Smack XMPP API before 4.0.0-rc1 does not verify basicConstraints and nameConstraints in X.509 certificate chains from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate chain. The man-in-the-middle attacker requires a certificate that is valid for any domain name. Upstream patch: <a href="http://fisheye.igniterealtime.org/changelog/smackgit?cs=93030c218c62cf0a0a8ea48746db1452fa34033c">http://fisheye.igniterealtime.org/changelog/smackgit?cs=93030c218c62cf0a0a8ea48746db1452fa34033c</a> From code inspection, this issue affects the 3.2.2 version in Fedora (the CERT advisory mentions version 3.4.1 and possibly earlier versions).
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Igniterealtime Smack | <4.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)