CVE-2012-6153

NameCVE-2012-6153
Descriptionhttp/conn/ssl/AbstractVerifier.java in Apache Commons HttpClient before 4.2.3 does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a certificate with a subject that specifies a common name in a field that is not the CN field. NOTE: this issue exists because of an incomplete fix for CVE-2012-5783.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-222-1
Debian Bugs692442

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
commons-httpclient (PTS)sid, trixie, bookworm, bullseye3.1-16fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
commons-httpclientsourcesqueeze3.1-9+deb6u1DLA-222-1
commons-httpclientsource(unstable)3.1-10.2692442

Notes

References to upstream patches for 4.x can be found in https://issues.apache.org/jira/browse/HTTPCLIENT-1549

Search for package or bug name: Reporting problems