|Description||The ssl_verify_server_cert function in sql-common/client.c in MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10; Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier; and Percona Server do not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a "/CN=" string in a field in a certificate, as demonstrated by "/OU=/CN=bar.com/CN=foo.com."|
|Source||CVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)|
|References||DLA-447-1, DSA-3453-1, DSA-3557-1|
|NVD severity||medium (attack range: remote)|
|Debian Bugs||821094, 821100|
Vulnerable and fixed packages
The table below lists information on source packages.
|mariadb-10.0 (PTS)||jessie (security), jessie||10.0.32-0+deb8u1||fixed|
|mysql-5.5 (PTS)||jessie (security), jessie||5.5.60-0+deb8u1||fixed|
The information below is based on the following data on fixed versions.
[squeeze] - mysql-5.5 <no-dsa> (will be fixed along with an upcoming Oracle CPU)