CVE Vulnerabilities

CVE-2016-4467

Improper Certificate Validation

Published: May 02, 2017 | Modified: Nov 07, 2023
CVSS 3.x
5.9
MEDIUM
Source:
NVD
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
CVSS 2.x
4.3 MEDIUM
AV:N/AC:M/Au:N/C:N/I:P/A:N
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM

The C client and C-based client bindings in the Apache Qpid Proton library before 0.13.1 on Windows do not properly verify that the server hostname matches a domain name in the subjects Common Name (CN) or subjectAltName field of the X.509 certificate when using the SChannel-based security layer, which allows man-in-the-middle attackers to spoof servers via an arbitrary valid certificate.

Weakness

The product does not validate, or incorrectly validates, a certificate.

Affected Software

Name Vendor Start Version End Version
Qpid_proton Apache 0.8.0 (including) 0.8.0 (including)
Qpid_proton Apache 0.9.0 (including) 0.9.0 (including)
Qpid_proton Apache 0.9.1 (including) 0.9.1 (including)
Qpid_proton Apache 0.10.0 (including) 0.10.0 (including)
Qpid_proton Apache 0.11.0 (including) 0.11.0 (including)
Qpid_proton Apache 0.11.1 (including) 0.11.1 (including)
Qpid_proton Apache 0.12.0 (including) 0.12.0 (including)
Qpid_proton Apache 0.12.1 (including) 0.12.1 (including)
Qpid_proton Apache 0.12.2 (including) 0.12.2 (including)
Qpid_proton Apache 0.13.0 (including) 0.13.0 (including)
Qpid-proton Ubuntu upstream *

Potential Mitigations

References