CVE-2014-3577

NameCVE-2014-3577
Descriptionorg.apache.http.conn.ssl.AbstractVerifier in Apache HttpComponents HttpClient before 4.3.5 and HttpAsyncClient before 4.0.2 does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a "CN=" string in a field in the distinguished name (DN) of a certificate, as demonstrated by the "foo,CN=www.apache.org" string in the O field.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-222-1
Debian Bugs758086

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
commons-httpclient (PTS)sid, trixie, bookworm, bullseye3.1-16fixed
httpcomponents-client (PTS)bullseye4.5.13-2fixed
sid, trixie, bookworm4.5.14-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
commons-httpclientsourcesqueeze3.1-9+deb6u1DLA-222-1
commons-httpclientsourcewheezy3.1-10.2+deb7u1
commons-httpclientsource(unstable)3.1-11758086
httpcomponents-clientsourcewheezy4.1.1-2+deb7u1
httpcomponents-clientsource(unstable)4.3.5-1

Notes

[squeeze] - httpcomponents-client <no-dsa> (Minor issue)
See https://bugs.debian.org/758086#59 for full details.

Search for package or bug name: Reporting problems