CVE-2010-1194

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

The match_component function in smtp-tls.c in libESMTP 1.0.3.r1, and possibly other versions including 1.0.4, treats two strings as equal if one is a substring of the other, which allows remote attackers to spoof trusted certificates via a crafted subjectAltName.

References

http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=311191

http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html

http://www.openwall.com/lists/oss-security/2010/03/03/6

http://www.openwall.com/lists/oss-security/2010/03/09/3

http://www.vupen.com/english/advisories/2010/1107

Details

Source: MITRE

Published: 2010-03-31

Updated: 2010-05-22

Type: CWE-310

Risk Information

CVSS v2

Base Score: 6.8

Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Impact Score: 6.4

Exploitability Score: 8.6

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:stafford.uklinux:libesmtp:0.1:-:*:*:*:*:*:*

cpe:2.3:a:stafford.uklinux:libesmtp:0.1:a:*:*:*:*:*:*

cpe:2.3:a:stafford.uklinux:libesmtp:0.2:*:*:*:*:*:*:*

cpe:2.3:a:stafford.uklinux:libesmtp:0.3:*:*:*:*:*:*:*

cpe:2.3:a:stafford.uklinux:libesmtp:0.4:*:*:*:*:*:*:*

cpe:2.3:a:stafford.uklinux:libesmtp:0.5:*:*:*:*:*:*:*

cpe:2.3:a:stafford.uklinux:libesmtp:0.6:*:*:*:*:*:*:*

cpe:2.3:a:stafford.uklinux:libesmtp:0.6:a:*:*:*:*:*:*

cpe:2.3:a:stafford.uklinux:libesmtp:0.6.1:*:*:*:*:*:*:*

cpe:2.3:a:stafford.uklinux:libesmtp:0.7.0:*:*:*:*:*:*:*

cpe:2.3:a:stafford.uklinux:libesmtp:0.7.1:*:*:*:*:*:*:*

cpe:2.3:a:stafford.uklinux:libesmtp:0.8.0:*:*:*:*:*:*:*

cpe:2.3:a:stafford.uklinux:libesmtp:0.8.1:*:*:*:*:*:*:*

cpe:2.3:a:stafford.uklinux:libesmtp:0.8.2:*:*:*:*:*:*:*

cpe:2.3:a:stafford.uklinux:libesmtp:0.8.3:*:*:*:*:*:*:*

cpe:2.3:a:stafford.uklinux:libesmtp:0.8.4:*:*:*:*:*:*:*

cpe:2.3:a:stafford.uklinux:libesmtp:0.8.5:*:*:*:*:*:*:*

cpe:2.3:a:stafford.uklinux:libesmtp:0.8.6:*:*:*:*:*:*:*

cpe:2.3:a:stafford.uklinux:libesmtp:0.8.7:*:*:*:*:*:*:*

cpe:2.3:a:stafford.uklinux:libesmtp:0.8.8:*:*:*:*:*:*:*

cpe:2.3:a:stafford.uklinux:libesmtp:0.8.9:*:*:*:*:*:*:*

cpe:2.3:a:stafford.uklinux:libesmtp:0.8.10:*:*:*:*:*:*:*

cpe:2.3:a:stafford.uklinux:libesmtp:0.8.10:p1:*:*:*:*:*:*

cpe:2.3:a:stafford.uklinux:libesmtp:0.8.11:*:*:*:*:*:*:*

cpe:2.3:a:stafford.uklinux:libesmtp:0.8.12:*:*:*:*:*:*:*

cpe:2.3:a:stafford.uklinux:libesmtp:1.0:*:*:*:*:*:*:*

cpe:2.3:a:stafford.uklinux:libesmtp:1.0:rc1:*:*:*:*:*:*

cpe:2.3:a:stafford.uklinux:libesmtp:1.0.1:*:*:*:*:*:*:*

cpe:2.3:a:stafford.uklinux:libesmtp:1.0.2:*:*:*:*:*:*:*

cpe:2.3:a:stafford.uklinux:libesmtp:1.0.3:*:*:*:*:*:*:*

cpe:2.3:a:stafford.uklinux:libesmtp:1.0.3:r1:*:*:*:*:*:*

cpe:2.3:a:stafford.uklinux:libesmtp:1.0.4:*:*:*:*:*:*:*

Tenable Plugins

View all (5 total)

IDNameProductFamilySeverity
50929SuSE 11 Security Update : libesmtp (SAT Patch Number 2390)NessusSuSE Local Security Checks
medium
49742Mandriva Linux Security Advisory : libesmtp (MDVSA-2010:195)NessusMandriva Local Security Checks
medium
46251openSUSE Security Update : libesmtp (openSUSE-SU-2010:0220-1)NessusSuSE Local Security Checks
medium
46250openSUSE Security Update : libesmtp (openSUSE-SU-2010:0220-1)NessusSuSE Local Security Checks
medium
46249openSUSE Security Update : libesmtp (openSUSE-SU-2010:0220-1)NessusSuSE Local Security Checks
medium