Executive Summary

Informations
Name CVE-2009-3767 First vendor Publication 2009-10-23
Vendor Cve Last vendor Modification 2020-10-14

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:N/I:P/A:N)
Cvss Base Score 4.3 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

libraries/libldap/tls_o.c in OpenLDAP 2.2 and 2.4, and possibly other versions, when OpenSSL is used, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3767

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-295 Certificate Issues

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:11178
 
Oval ID: oval:org.mitre.oval:def:11178
Title: libraries/libldap/tls_o.c in OpenLDAP 2.2 and 2.4, and possibly other versions, when OpenSSL is used, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
Description: libraries/libldap/tls_o.c in OpenLDAP 2.2 and 2.4, and possibly other versions, when OpenSSL is used, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
Family: unix Class: vulnerability
Reference(s): CVE-2009-3767
Version: 5
Platform(s): Red Hat Enterprise Linux 5
CentOS Linux 5
Oracle Linux 5
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:13869
 
Oval ID: oval:org.mitre.oval:def:13869
Title: USN-858-1 -- openldap2.2 vulnerability
Description: It was discovered that OpenLDAP did not correctly handle SSL certificates with zero bytes in the Common Name. A remote attacker could exploit this to perform a man in the middle attack to view sensitive information or alter encrypted communications.
Family: unix Class: patch
Reference(s): USN-858-1
CVE-2009-3767
Version: 5
Platform(s): Ubuntu 6.06
Product(s): openldap2.2
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:20225
 
Oval ID: oval:org.mitre.oval:def:20225
Title: DSA-1943-1 openldap openldap2.3 - SSL certificate
Description: It was discovered that OpenLDAP, a free implementation of the Lightweight Directory Access Protocol, when OpenSSL is used, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.
Family: unix Class: patch
Reference(s): DSA-1943-1
CVE-2009-3767
Version: 5
Platform(s): Debian GNU/Linux 4.0
Debian GNU/Linux 5.0
Product(s): openldap2.3
openldap
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:21799
 
Oval ID: oval:org.mitre.oval:def:21799
Title: RHSA-2010:0198: openldap security and bug fix update (Moderate)
Description: libraries/libldap/tls_o.c in OpenLDAP 2.2 and 2.4, and possibly other versions, when OpenSSL is used, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
Family: unix Class: patch
Reference(s): RHSA-2010:0198-04
CVE-2009-3767
Version: 4
Platform(s): Red Hat Enterprise Linux 5
Product(s): openldap
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:23047
 
Oval ID: oval:org.mitre.oval:def:23047
Title: ELSA-2010:0198: openldap security and bug fix update (Moderate)
Description: libraries/libldap/tls_o.c in OpenLDAP 2.2 and 2.4, and possibly other versions, when OpenSSL is used, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
Family: unix Class: patch
Reference(s): ELSA-2010:0198-04
CVE-2009-3767
Version: 6
Platform(s): Oracle Linux 5
Product(s): openldap
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:28271
 
Oval ID: oval:org.mitre.oval:def:28271
Title: DEPRECATED: ELSA-2010-0198 -- openldap security and bug fix update (moderate)
Description: [2.3.43-12] - updated spec file, so the compat-libs linking patch applies correctly [2.3.43-11] - backported patch to handle null character in TLS certificates (#560912) [2.3.43-10] - updated chase-referral patch to compile cleanly - updated init script (#562714) [2.3.43-9] - updated ldap.sysconf to include SLAPD_LDAP, SLAPD_LDAPS and SLAPD_LDAPI options (#559520) [2.3.43-8] - fixed connection freeze when TLSVerifyClient = allow (#509230) [2.3.43-7] - fixed chasing referrals in libldap (#510522) [2.3.43-6] - fixed possible double free() in rwm overlay (#495628) - updated slapd man page and slapcat usage string (#468206) - updated default config for slapd - deleted syncprov module (#466937) - fixed migration tools autofs generated format (#460331) - fixed migration tools numbers detection in /etc/shadow (#113857) - fixed migration tools base ldif (#104585) [2.3.43-5] - implementation of limit adjustment before starting slapd (#527313) - init script no longer executes script in /tmp (#483356) - slapd not starting with ldap:/// every time (#481003) - delay between TERM and KILL when shutting down slapd (#452064) [2.3.43-4] - fixed compat libs linking (#503734) - activated lightweight dispatcher feature (#507276) - detection of timeout after failed result (#495701
Family: unix Class: patch
Reference(s): ELSA-2010-0198
CVE-2009-3767
Version: 4
Platform(s): Oracle Linux 5
Product(s): openldap
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:7274
 
Oval ID: oval:org.mitre.oval:def:7274
Title: VMware ESX, Service Console update for OpenLDAP.
Description: libraries/libldap/tls_o.c in OpenLDAP 2.2 and 2.4, and possibly other versions, when OpenSSL is used, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
Family: unix Class: vulnerability
Reference(s): CVE-2009-3767
Version: 5
Platform(s): VMWare ESX Server 4.0
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:7899
 
Oval ID: oval:org.mitre.oval:def:7899
Title: DSA-1943 openldap openldap2.3 -- insufficient input validation
Description: It was discovered that OpenLDAP, a free implementation of the Lightweight Directory Access Protocol, when OpenSSL is used, does not properly handle a "\0" character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.
Family: unix Class: patch
Reference(s): DSA-1943
CVE-2009-3767
Version: 3
Platform(s): Debian GNU/Linux 5.0
Debian GNU/Linux 4.0
Product(s): openldap
openldap2.3
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 178

OpenVAS Exploits

Date Description
2010-07-23 Name : RedHat Update for openldap RHSA-2010:0543-01
File : nvt/gb_RHSA-2010_0543-01_openldap.nasl
2010-04-06 Name : RedHat Update for openldap RHSA-2010:0198-04
File : nvt/gb_RHSA-2010_0198-04_openldap.nasl
2010-03-05 Name : Fedora Update for openldap FEDORA-2010-0752
File : nvt/gb_fedora_2010_0752_openldap_fc11.nasl
2010-01-29 Name : Mandriva Update for openldap MDVSA-2010:026 (openldap)
File : nvt/gb_mandriva_MDVSA_2010_026.nasl
2009-12-10 Name : Debian Security Advisory DSA 1943-1 (openldap openldap2.3)
File : nvt/deb_1943_1.nasl
2009-11-17 Name : Ubuntu USN-858-1 (openldap2.2)
File : nvt/ubuntu_858_1.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
59268 OpenLDAP libraries/libldap/tls_o.c Certificate Authority (CA) Common Name Nul...

Nessus® Vulnerability Scanner

Date Description
2016-03-08 Name : The remote VMware ESX host is missing a security-related patch.
File : vmware_VMSA-2010-0015_remote.nasl - Type : ACT_GATHER_INFO
2014-11-17 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2010-0476.nasl - Type : ACT_GATHER_INFO
2014-07-01 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201406-36.nasl - Type : ACT_GATHER_INFO
2014-04-16 Name : The remote FreeBSD host is missing one or more security-related updates.
File : freebsd_pkg_abad20bfc1b411e3a5ac001b21614864.nasl - Type : ACT_GATHER_INFO
2013-07-15 Name : The remote OracleVM host is missing a security update.
File : oraclevm_OVMSA-2010-0015.nasl - Type : ACT_GATHER_INFO
2013-07-12 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2010-0543.nasl - Type : ACT_GATHER_INFO
2012-08-01 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20100330_openldap_on_SL5_x.nasl - Type : ACT_GATHER_INFO
2010-10-04 Name : The remote VMware ESX host is missing one or more security-related patches.
File : vmware_VMSA-2010-0015.nasl - Type : ACT_GATHER_INFO
2010-07-28 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2010-0543.nasl - Type : ACT_GATHER_INFO
2010-07-22 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2010-0543.nasl - Type : ACT_GATHER_INFO
2010-07-01 Name : The remote Fedora host is missing a security update.
File : fedora_2010-0752.nasl - Type : ACT_GATHER_INFO
2010-05-11 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2010-0198.nasl - Type : ACT_GATHER_INFO
2010-02-24 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-1943.nasl - Type : ACT_GATHER_INFO
2010-01-27 Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2010-026.nasl - Type : ACT_GATHER_INFO
2009-11-13 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-858-1.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
APPLE http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html
CONFIRM http://support.apple.com/kb/HT3937
http://www.openldap.org/devel/cvsweb.cgi/libraries/libldap/tls_o.c.diff?r1=1....
FEDORA http://lists.fedoraproject.org/pipermail/package-announce/2010-March/036138.html
GENTOO http://security.gentoo.org/glsa/glsa-201406-36.xml
MLIST http://marc.info/?l=oss-security&m=125198917018936&w=2
http://marc.info/?l=oss-security&m=125369675820512&w=2
OVAL https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
REDHAT http://www.redhat.com/support/errata/RHSA-2010-0543.html
http://www.redhat.com/support/errata/RHSA-2011-0896.html
SECUNIA http://secunia.com/advisories/38769
http://secunia.com/advisories/40677
SUSE http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html
VUPEN http://www.vupen.com/english/advisories/2009/3056
http://www.vupen.com/english/advisories/2010/1858

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
Date Informations
2020-10-14 21:22:52
  • Multiple Updates
2020-05-23 00:24:30
  • Multiple Updates
2017-09-19 09:23:28
  • Multiple Updates
2017-01-07 09:25:07
  • Multiple Updates
2016-06-29 00:07:51
  • Multiple Updates
2016-04-26 19:13:18
  • Multiple Updates
2016-03-09 13:25:54
  • Multiple Updates
2014-11-18 13:25:34
  • Multiple Updates
2014-07-02 13:25:50
  • Multiple Updates
2014-04-17 13:25:35
  • Multiple Updates
2014-02-17 10:52:07
  • Multiple Updates
2013-05-10 23:59:54
  • Multiple Updates