- Description
- KDE KSSL in kdelibs 3.5.4, 4.2.4, and 4.3 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
- Source
- cve@mitre.org
- NVD status
- Modified
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
- nvd@nist.gov
- CWE-310
- Hype score
- Not currently trending
- Red HatRed Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2009-2702 This issue did not affect kdelibs packages as shipped in Red Hat Enterprise Linux 3 and 4. The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw in Red Hat Enterprise Linux 5.
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kde:kdelibs:3.5.4:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "EF92CC57-A136-4018-A350-44B8416E2111"
},
{
"criteria": "cpe:2.3:a:kde:kdelibs:4.2.4:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "D9184861-CD72-403A-B217-E58F7375D156"
},
{
"criteria": "cpe:2.3:a:kde:kdelibs:4.3:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "6DEE716D-C9EA-4BEB-9B60-A4C4512D9DF2"
}
],
"operator": "OR"
}
]
}
]