neon before 0.28.6, when OpenSSL or GnuTLS is used, does not properly handle a 0 character in a domain name in the subjects Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
The product stores or transmits sensitive data using an encryption scheme that is theoretically sound, but is not strong enough for the level of protection required.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Neon | Webdav | * | 0.28.6 (excluding) |
Red Hat Enterprise Linux 4 | RedHat | neon-0:0.24.7-4.el4_8.2 | * |
Red Hat Enterprise Linux 5 | RedHat | neon-0:0.25.5-10.el5_4.1 | * |
Neon | Ubuntu | dapper | * |
Neon26 | Ubuntu | hardy | * |
Neon26 | Ubuntu | intrepid | * |
Neon26 | Ubuntu | jaunty | * |
Neon26 | Ubuntu | karmic | * |
Neon26 | Ubuntu | lucid | * |
Neon27 | Ubuntu | hardy | * |
Neon27 | Ubuntu | intrepid | * |
Neon27 | Ubuntu | jaunty | * |
Neon27 | Ubuntu | upstream | * |