First published: Mon Sep 08 2014(Updated: )
Jakarta Commons HTTPClient implements the client side of HTTP standards.<br>It was discovered that the HTTPClient incorrectly extracted host name from<br>an X.509 certificate subject's Common Name (CN) field. A man-in-the-middle<br>attacker could use this flaw to spoof an SSL server using a specially<br>crafted X.509 certificate. (CVE-2014-3577)<br>For additional information on this flaw, refer to the Knowledgebase<br>article in the References section.<br>All jakarta-commons-httpclient users are advised to upgrade to these<br>updated packages, which contain a backported patch to correct this issue.<br>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jakarta-commons-httpclient | <3.1-16.el7_0 | 3.1-16.el7_0 |
redhat/jakarta-commons-httpclient | <3.1-16.el7_0 | 3.1-16.el7_0 |
redhat/jakarta-commons-httpclient-demo | <3.1-16.el7_0 | 3.1-16.el7_0 |
redhat/jakarta-commons-httpclient-javadoc | <3.1-16.el7_0 | 3.1-16.el7_0 |
redhat/jakarta-commons-httpclient-manual | <3.1-16.el7_0 | 3.1-16.el7_0 |
redhat/jakarta-commons-httpclient | <3.1-0.9.el6_5 | 3.1-0.9.el6_5 |
redhat/jakarta-commons-httpclient | <3.1-0.9.el6_5 | 3.1-0.9.el6_5 |
redhat/jakarta-commons-httpclient-debuginfo | <3.1-0.9.el6_5 | 3.1-0.9.el6_5 |
redhat/jakarta-commons-httpclient-demo | <3.1-0.9.el6_5 | 3.1-0.9.el6_5 |
redhat/jakarta-commons-httpclient-javadoc | <3.1-0.9.el6_5 | 3.1-0.9.el6_5 |
redhat/jakarta-commons-httpclient-manual | <3.1-0.9.el6_5 | 3.1-0.9.el6_5 |
redhat/jakarta-commons-httpclient-debuginfo | <3.1-0.9.el6_5 | 3.1-0.9.el6_5 |
redhat/jakarta-commons-httpclient-demo | <3.1-0.9.el6_5 | 3.1-0.9.el6_5 |
redhat/jakarta-commons-httpclient-javadoc | <3.1-0.9.el6_5 | 3.1-0.9.el6_5 |
redhat/jakarta-commons-httpclient-manual | <3.1-0.9.el6_5 | 3.1-0.9.el6_5 |
redhat/jakarta-commons-httpclient | <3.0-7jpp.4.el5_10 | 3.0-7jpp.4.el5_10 |
redhat/jakarta-commons-httpclient | <3.0-7jpp.4.el5_10 | 3.0-7jpp.4.el5_10 |
redhat/jakarta-commons-httpclient-debuginfo | <3.0-7jpp.4.el5_10 | 3.0-7jpp.4.el5_10 |
redhat/jakarta-commons-httpclient-demo | <3.0-7jpp.4.el5_10 | 3.0-7jpp.4.el5_10 |
redhat/jakarta-commons-httpclient-javadoc | <3.0-7jpp.4.el5_10 | 3.0-7jpp.4.el5_10 |
redhat/jakarta-commons-httpclient-manual | <3.0-7jpp.4.el5_10 | 3.0-7jpp.4.el5_10 |
redhat/jakarta-commons-httpclient-debuginfo | <3.0-7jpp.4.el5_10 | 3.0-7jpp.4.el5_10 |
redhat/jakarta-commons-httpclient-demo | <3.0-7jpp.4.el5_10 | 3.0-7jpp.4.el5_10 |
redhat/jakarta-commons-httpclient-javadoc | <3.0-7jpp.4.el5_10 | 3.0-7jpp.4.el5_10 |
redhat/jakarta-commons-httpclient-manual | <3.0-7jpp.4.el5_10 | 3.0-7jpp.4.el5_10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2014:1166 is classified as important.
To fix RHSA-2014:1166, update to the packages jakarta-commons-httpclient 3.1-16.el7_0 or higher.
RHSA-2014:1166 affects the Jakarta Commons HTTPClient versions prior to 3.1-16.el7_0.
RHSA-2014:1166 addresses a man-in-the-middle vulnerability that allows SSL server spoofing.
The impacted packages include jakarta-commons-httpclient, jakarta-commons-httpclient-demo, and jakarta-commons-httpclient-manual, among others.