First published: Sat Mar 24 2018(Updated: )
The int_x509_param_set_hosts function in lib/libcrypto/x509/x509_vpm.c in LibreSSL 2.7.0 before 2.7.1 does not support a certain special case of a zero name length, which causes silent omission of hostname verification, and consequently allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. NOTE: the LibreSSL documentation indicates that this special case is supported, but the BoringSSL documentation does not.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Openbsd Libressl | =2.7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-8970 is a vulnerability in the LibreSSL library that allows man-in-the-middle attackers to spoof servers and obtain sensitive information.
The severity of CVE-2018-8970 is high with a CVSS score of 7.4.
CVE-2018-8970 occurs due to a special case of a zero name length in the int_x509_param_set_hosts function, which causes silent omission of hostname verification.
OpenBSD LibreSSL version 2.7.0 is affected by CVE-2018-8970.
To fix CVE-2018-8970, upgrade to LibreSSL version 2.7.1 or later.