CVE-2009-2474

NameCVE-2009-2474
Descriptionneon before 0.28.6, when OpenSSL or GnuTLS is used, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs542926

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
litmus (PTS)buster0.13-2fixed
bullseye0.13-3fixed
sid, trixie, bookworm0.13-5fixed
neon27 (PTS)buster0.30.2-3fixed
bullseye0.31.2-1fixed
bookworm0.32.5-1fixed
trixie0.33.0-1fixed
sid0.33.0-1.1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
gnome-vfs2source(unstable)(unfixed)
litmussource(unstable)0.13-1
neonsource(unstable)(unfixed)low542926
neon26source(unstable)0.26.4-3low542926
neon27source(unstable)0.28.6-1low542926

Notes

[lenny] - neon27 <no-dsa> (Minor issue)
[lenny] - neon26 <no-dsa> (Minor issue)
[etch] - neon <no-dsa> (Minor issue)
affected neon code copy present in gnome-vfs2 [./imported/*]
affected neon code copy present in litmus [./libneon/*]
The new reintroduced litmus package removes the embedded copy

Search for package or bug name: Reporting problems