Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2009-2510 | First vendor Publication | 2009-10-14 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 6.8 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
The CryptoAPI component in Microsoft Windows 2000 SP4, Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista Gold, SP1, and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7, as used by Internet Explorer and other applications, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, aka "Null Truncation in X.509 Common Name Vulnerability," a related issue to CVE-2009-2408. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2510 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-310 | Cryptographic Issues |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:5842 | |||
Oval ID: | oval:org.mitre.oval:def:5842 | ||
Title: | Null Truncation in X.509 Common Name Vulnerability | ||
Description: | The CryptoAPI component in Microsoft Windows 2000 SP4, Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista Gold, SP1, and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7, as used by Internet Explorer and other applications, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, aka "Null Truncation in X.509 Common Name Vulnerability," a related issue to CVE-2009-2408. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2009-2510 | Version: | 8 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows 7 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 | Product(s): | Microsoft ASN.1 Library |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2009-10-14 | Name : Microsoft Windows CryptoAPI X.509 Spoofing Vulnerabilities (974571) File : nvt/secpod_ms09-056.nasl |
2009-10-06 | Name : Microsoft IE CA SSL Certificate Security Bypass Vulnerability - Oct09 File : nvt/gb_ms_ie_ssl_certi_sec_bypass_vuln_oct09.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
58855 | Microsoft Windows CryptoAPI X.509 Certificate Common Name Null Truncation Spo... |
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2009-10-15 | IAVM : 2009-A-0095 - Multiple Vulnerabilities in Microsoft Windows CryptoAPI Severity : Category I - VMSKEY : V0021760 |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Microsoft Windows CryptoAPI common name spoofing attempt RuleID : 24490 - Revision : 4 - Type : OS-WINDOWS |
2014-01-10 | Microsoft Windows CryptoAPI common name spoofing attempt RuleID : 24489 - Revision : 4 - Type : OS-WINDOWS |
2014-01-10 | Microsoft Windows CryptoAPI common name spoofing attempt RuleID : 24488 - Revision : 4 - Type : OS-WINDOWS |
2014-01-10 | Microsoft Windows CryptoAPI ASN.1 integer overflow attempt RuleID : 16181 - Revision : 10 - Type : OS-WINDOWS |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2009-12-01 | Name : A client application installed on the remote Windows host is affected by a ma... File : citrix_ica_client_ssl_mitm.nasl - Type : ACT_GATHER_INFO |
2009-10-13 | Name : Certain identity validation methods may be bypassed allowing impersonation. File : smb_nt_ms09-056.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:10:12 |
|
2024-11-28 12:19:26 |
|
2023-12-07 21:28:05 |
|
2021-05-04 12:09:50 |
|
2021-04-22 01:10:11 |
|
2020-05-23 00:24:03 |
|
2018-10-31 00:19:57 |
|
2018-10-13 00:22:50 |
|
2017-09-19 09:23:18 |
|
2016-09-30 01:02:07 |
|
2016-08-31 12:01:50 |
|
2016-08-05 12:02:10 |
|
2016-06-28 17:46:13 |
|
2016-04-26 18:58:51 |
|
2014-02-17 10:50:51 |
|
2014-01-19 21:26:02 |
|
2013-11-11 12:38:22 |
|
2013-05-10 23:54:13 |
|