CVE-2012-6153

NameCVE-2012-6153
Descriptionhttp/conn/ssl/AbstractVerifier.java in Apache Commons HttpClient before 4.2.3 does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a certificate with a subject that specifies a common name in a field that is not the CN field. NOTE: this issue exists because of an incomplete fix for CVE-2012-5783.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-222-1
NVD severitymedium (attack range: remote)
Debian Bugs692442

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
commons-httpclient (PTS)wheezy3.1-10.2+deb7u2fixed
jessie3.1-11+deb8u1fixed
stretch3.1-12fixed
buster, sid3.1-13fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
commons-httpclientsource(unstable)3.1-10.2medium692442
commons-httpclientsourcesqueeze3.1-9+deb6u1mediumDLA-222-1

Notes

References to upstream patches for 4.x can be found in https://issues.apache.org/jira/browse/HTTPCLIENT-1549

Search for package or bug name: Reporting problems