First published: Wed Sep 03 2014(Updated: )
HttpClient is an HTTP/1.1 compliant HTTP agent implementation based on<br>httpcomponents HttpCore.<br>It was discovered that the HttpClient incorrectly extracted host name from<br>an X.509 certificate subject's Common Name (CN) field. A man-in-the-middle<br>attacker could use this flaw to spoof an SSL server using a specially<br>crafted X.509 certificate. (CVE-2014-3577)<br>For additional information on this flaw, refer to the Knowledgebase<br>article in the References section.<br>All httpcomponents-client users are advised to upgrade to these updated<br>packages, which contain a backported patch to correct this issue.<br>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/httpcomponents-client | <4.2.5-5.el7_0 | 4.2.5-5.el7_0 |
redhat/httpcomponents-client | <4.2.5-5.el7_0 | 4.2.5-5.el7_0 |
redhat/httpcomponents-client-javadoc | <4.2.5-5.el7_0 | 4.2.5-5.el7_0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2014:1146 is classified as Important.
To fix RHSA-2014:1146, you should update the httpcomponents-client and related packages to version 4.2.5-5.el7_0.
The affected software includes httpcomponents-client and httpcomponents-client-javadoc in versions prior to 4.2.5-5.el7_0.
RHSA-2014:1146 is associated with a man-in-the-middle attack due to improper hostname extraction from X.509 certificate.
RHSA-2014:1146 was released in 2014.