First published: Fri Oct 06 2017(Updated: )
CyaSSL does not check the key usage extension in leaf certificates, which allows remote attackers to spoof servers via a crafted server certificate not authorized for use in an SSL/TLS handshake.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/wolfssl | 4.6.0+p1-0+deb11u2 5.5.4-2+deb12u1 5.7.0-0.3 | |
wolfSSL | <=2.9.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-2903 is considered a moderate vulnerability due to the risk of server spoofing using crafted certificates.
To fix CVE-2014-2903, update the wolfSSL package to at least version 4.6.0+p1-0+deb11u2 or to a later version.
CVE-2014-2903 affects wolfSSL versions up to and including 2.9.4 and specific Debian packages thereof.
Yes, CVE-2014-2903 can be exploited remotely by attackers using specially crafted server certificates.
CVE-2014-2903 facilitates man-in-the-middle attacks by allowing attackers to spoof server identity during SSL/TLS handshakes.