Overview
The POCO C++ Libraries NetSSL library fails to properly validate wildcard certificates, allowing an attacker to trick the victim application into trusting a malicious certificate.
Description
CWE-350: Reliance on Reverse DNS Resolution for a Security-Critical Action Guenter Obiltschnig of Applied Informatics GmbH reports: |
Impact
After a successful DNS spoofing attack, the attacker may be able to trick a SSL/TLS client into successfully validating a certificate from a malicious server. However, this requires that the certificate first passes the certificate chain validation. |
Solution
Apply an Update |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | 6.4 | AV:N/AC:L/Au:N/C:P/I:P/A:N |
Temporal | 4.7 | E:U/RL:OF/RC:C |
Environmental | 1.2 | CDP:ND/TD:L/CR:ND/IR:ND/AR:ND |
References
Acknowledgements
Thanks to Tuomas Siren and Alexander Berezhnoy for originally discovering the vulnerability.
This document was written by Todd Lewellen.
Other Information
CVE IDs: | CVE-2014-0350 |
Date Public: | 2014-04-24 |
Date First Published: | 2014-04-24 |
Date Last Updated: | 2014-04-24 15:00 UTC |
Document Revision: | 7 |