CVE-2010-1192

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

libESMTP, probably 1.0.4 and earlier, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.

References

http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html

http://www.openwall.com/lists/oss-security/2010/03/03/6

http://www.openwall.com/lists/oss-security/2010/03/09/3

http://www.vupen.com/english/advisories/2010/1107

Details

Source: MITRE

Published: 2010-03-31

Updated: 2010-05-22

Type: CWE-310

Risk Information

CVSS v2

Base Score: 6.8

Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Impact Score: 6.4

Exploitability Score: 8.6

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:stafford.uklinux:libesmtp:0.1:-:*:*:*:*:*:*

cpe:2.3:a:stafford.uklinux:libesmtp:0.1:a:*:*:*:*:*:*

cpe:2.3:a:stafford.uklinux:libesmtp:0.2:*:*:*:*:*:*:*

cpe:2.3:a:stafford.uklinux:libesmtp:0.3:*:*:*:*:*:*:*

cpe:2.3:a:stafford.uklinux:libesmtp:0.4:*:*:*:*:*:*:*

cpe:2.3:a:stafford.uklinux:libesmtp:0.5:*:*:*:*:*:*:*

cpe:2.3:a:stafford.uklinux:libesmtp:0.6:*:*:*:*:*:*:*

cpe:2.3:a:stafford.uklinux:libesmtp:0.6:a:*:*:*:*:*:*

cpe:2.3:a:stafford.uklinux:libesmtp:0.6.1:*:*:*:*:*:*:*

cpe:2.3:a:stafford.uklinux:libesmtp:0.7.0:*:*:*:*:*:*:*

cpe:2.3:a:stafford.uklinux:libesmtp:0.7.1:*:*:*:*:*:*:*

cpe:2.3:a:stafford.uklinux:libesmtp:0.8.0:*:*:*:*:*:*:*

cpe:2.3:a:stafford.uklinux:libesmtp:0.8.1:*:*:*:*:*:*:*

cpe:2.3:a:stafford.uklinux:libesmtp:0.8.2:*:*:*:*:*:*:*

cpe:2.3:a:stafford.uklinux:libesmtp:0.8.3:*:*:*:*:*:*:*

cpe:2.3:a:stafford.uklinux:libesmtp:0.8.4:*:*:*:*:*:*:*

cpe:2.3:a:stafford.uklinux:libesmtp:0.8.5:*:*:*:*:*:*:*

cpe:2.3:a:stafford.uklinux:libesmtp:0.8.6:*:*:*:*:*:*:*

cpe:2.3:a:stafford.uklinux:libesmtp:0.8.7:*:*:*:*:*:*:*

cpe:2.3:a:stafford.uklinux:libesmtp:0.8.8:*:*:*:*:*:*:*

cpe:2.3:a:stafford.uklinux:libesmtp:0.8.9:*:*:*:*:*:*:*

cpe:2.3:a:stafford.uklinux:libesmtp:0.8.10:*:*:*:*:*:*:*

cpe:2.3:a:stafford.uklinux:libesmtp:0.8.10:p1:*:*:*:*:*:*

cpe:2.3:a:stafford.uklinux:libesmtp:0.8.11:*:*:*:*:*:*:*

cpe:2.3:a:stafford.uklinux:libesmtp:0.8.12:*:*:*:*:*:*:*

cpe:2.3:a:stafford.uklinux:libesmtp:1.0:*:*:*:*:*:*:*

cpe:2.3:a:stafford.uklinux:libesmtp:1.0:rc1:*:*:*:*:*:*

cpe:2.3:a:stafford.uklinux:libesmtp:1.0.1:*:*:*:*:*:*:*

cpe:2.3:a:stafford.uklinux:libesmtp:1.0.2:*:*:*:*:*:*:*

cpe:2.3:a:stafford.uklinux:libesmtp:1.0.3:*:*:*:*:*:*:*

cpe:2.3:a:stafford.uklinux:libesmtp:*:*:*:*:*:*:*:* versions up to 1.0.4 (inclusive)

Tenable Plugins

View all (5 total)

IDNameProductFamilySeverity
50929SuSE 11 Security Update : libesmtp (SAT Patch Number 2390)NessusSuSE Local Security Checks
medium
49742Mandriva Linux Security Advisory : libesmtp (MDVSA-2010:195)NessusMandriva Local Security Checks
medium
46251openSUSE Security Update : libesmtp (openSUSE-SU-2010:0220-1)NessusSuSE Local Security Checks
medium
46250openSUSE Security Update : libesmtp (openSUSE-SU-2010:0220-1)NessusSuSE Local Security Checks
medium
46249openSUSE Security Update : libesmtp (openSUSE-SU-2010:0220-1)NessusSuSE Local Security Checks
medium