CVE-2016-4467
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The C client and C-based client bindings in the Apache Qpid Proton library before 0.13.1 on Windows do not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate when using the SChannel-based security layer, which allows man-in-the-middle attackers to spoof servers via an arbitrary valid certificate.
El cliente en C y basado en C, en la librería Apache Qpid Proton anterior a la versión 0.13.1 en Windows no verifica correctamente que el nombre de host del servidor coincide con un nombre de dominio en el Common Name (CN) del asunto o en el campo subjectAltName del certificado X.509 cuando se utiliza una capa de seguridad basada en SChannel, lo que permite a atacantes miTm suplantar servidores a través de un certificado válido.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2016-05-02 CVE Reserved
- 2017-05-02 CVE Published
- 2023-03-07 EPSS Updated
- 2024-08-06 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-295: Improper Certificate Validation
CAPEC
References (4)
URL | Tag | Source |
---|---|---|
http://www.openwall.com/lists/oss-security/2016/07/15/3 | Mailing List | |
http://www.securityfocus.com/bid/91788 | Third Party Advisory | |
http://www.securitytracker.com/id/1036316 | Third Party Advisory | |
https://lists.apache.org/thread.html/914424e4d798a340f523b6169aaf39b626971d9bb00fcdeb1d5d6c0d%40%3Ccommits.qpid.apache.org%3E | Mailing List |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Apache Search vendor "Apache" | Qpid Proton Search vendor "Apache" for product "Qpid Proton" | 0.8.0 Search vendor "Apache" for product "Qpid Proton" and version "0.8.0" | - |
Affected
| ||||||
Apache Search vendor "Apache" | Qpid Proton Search vendor "Apache" for product "Qpid Proton" | 0.9.0 Search vendor "Apache" for product "Qpid Proton" and version "0.9.0" | - |
Affected
| ||||||
Apache Search vendor "Apache" | Qpid Proton Search vendor "Apache" for product "Qpid Proton" | 0.9.1 Search vendor "Apache" for product "Qpid Proton" and version "0.9.1" | - |
Affected
| ||||||
Apache Search vendor "Apache" | Qpid Proton Search vendor "Apache" for product "Qpid Proton" | 0.10.0 Search vendor "Apache" for product "Qpid Proton" and version "0.10.0" | - |
Affected
| ||||||
Apache Search vendor "Apache" | Qpid Proton Search vendor "Apache" for product "Qpid Proton" | 0.11.0 Search vendor "Apache" for product "Qpid Proton" and version "0.11.0" | - |
Affected
| ||||||
Apache Search vendor "Apache" | Qpid Proton Search vendor "Apache" for product "Qpid Proton" | 0.11.1 Search vendor "Apache" for product "Qpid Proton" and version "0.11.1" | - |
Affected
| ||||||
Apache Search vendor "Apache" | Qpid Proton Search vendor "Apache" for product "Qpid Proton" | 0.12.0 Search vendor "Apache" for product "Qpid Proton" and version "0.12.0" | - |
Affected
| ||||||
Apache Search vendor "Apache" | Qpid Proton Search vendor "Apache" for product "Qpid Proton" | 0.12.1 Search vendor "Apache" for product "Qpid Proton" and version "0.12.1" | - |
Affected
| ||||||
Apache Search vendor "Apache" | Qpid Proton Search vendor "Apache" for product "Qpid Proton" | 0.12.2 Search vendor "Apache" for product "Qpid Proton" and version "0.12.2" | - |
Affected
| ||||||
Apache Search vendor "Apache" | Qpid Proton Search vendor "Apache" for product "Qpid Proton" | 0.13.0 Search vendor "Apache" for product "Qpid Proton" and version "0.13.0" | - |
Affected
|