CVE Vulnerabilities

CVE-2014-3596

Published: Aug 27, 2014 | Modified: Apr 12, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
5.8 MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:N
RedHat/V2
5.8 IMPORTANT
AV:N/AC:M/Au:N/C:P/I:P/A:N
RedHat/V3
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

The getCN function in Apache Axis 1.4 and earlier does not properly verify that the server hostname matches a domain name in the subjects Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a certificate with a subject that specifies a common name in a field that is not the CN field. NOTE: this issue exists because of an incomplete fix for CVE-2012-5784.

Affected Software

NameVendorStart VersionEnd Version
AxisApache*1.4 (including)
AxisApache1.0 (including)1.0 (including)
AxisApache1.0-beta (including)1.0-beta (including)
AxisApache1.0-rc1 (including)1.0-rc1 (including)
AxisApache1.0-rc2 (including)1.0-rc2 (including)
AxisApache1.1 (including)1.1 (including)
AxisApache1.1-beta (including)1.1-beta (including)
AxisApache1.1-rc1 (including)1.1-rc1 (including)
AxisApache1.1-rc2 (including)1.1-rc2 (including)
AxisApache1.2 (including)1.2 (including)
AxisApache1.2-alpha (including)1.2-alpha (including)
AxisApache1.2-beta1 (including)1.2-beta1 (including)
AxisApache1.2-beta2 (including)1.2-beta2 (including)
AxisApache1.2-beta3 (including)1.2-beta3 (including)
AxisApache1.2-rc1 (including)1.2-rc1 (including)
AxisApache1.2-rc2 (including)1.2-rc2 (including)
AxisApache1.2-rc3 (including)1.2-rc3 (including)
AxisApache1.2.1 (including)1.2.1 (including)
AxisApache1.3 (including)1.3 (including)
Red Hat Enterprise Linux 5RedHataxis-0:1.2.1-2jpp.8.el5_10*
Red Hat Enterprise Linux 6RedHataxis-0:1.2.1-7.5.el6_5*
Red Hat JBoss Portal 6.2RedHataxis*
AxisUbuntulucid*
AxisUbuntuupstream*

References