| Name | CVE-2009-3767 |
| Description | libraries/libldap/tls_o.c in OpenLDAP 2.2 and 2.4, and possibly other versions, when OpenSSL is used, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408. |
| Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
| References | DSA-1943-1 |
| Debian Bugs | 553432 |
The table below lists information on source packages.
| Source Package | Release | Version | Status |
|---|---|---|---|
| openldap (PTS) | bullseye (security), bullseye | 2.4.57+dfsg-3+deb11u1 | fixed |
| bookworm | 2.5.13+dfsg-5 | fixed | |
| trixie, sid | 2.5.18+dfsg-2 | fixed |
The information below is based on the following data on fixed versions.
| Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
|---|---|---|---|---|---|---|
| openldap | source | lenny | 2.4.11-1+lenny1 | DSA-1943-1 | ||
| openldap | source | (unstable) | 2.4.17-2.1 | low | 553432 | |
| openldap2.3 | source | etch | 2.3.30-5+etch3 | DSA-1943-1 | ||
| openldap2.3 | source | (unstable) | (unfixed) |