cvelist/2011/1xxx/CVE-2011-1428.json

82 lines
2.8 KiB
JSON
Raw Normal View History

2017-10-16 12:31:07 -04:00
{
2019-03-18 02:51:15 +00:00
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2011-1428",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
2017-10-16 12:31:07 -04:00
{
2019-03-18 02:51:15 +00:00
"lang": "eng",
"value": "Wee Enhanced Environment for Chat (aka WeeChat) 0.3.4 and earlier does not properly verify that the server hostname matches the domain name of the subject of an X.509 certificate, which allows man-in-the-middle attackers to spoof an SSL chat server via an arbitrary certificate, related to incorrect use of the GnuTLS API."
2017-10-16 12:31:07 -04:00
}
2019-03-18 02:51:15 +00:00
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://savannah.nongnu.org/patch/index.php?7459",
"refsource": "CONFIRM",
"url": "http://savannah.nongnu.org/patch/index.php?7459"
},
{
"name": "46612",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/46612"
},
{
"name": "http://git.savannah.gnu.org/gitweb/?p=weechat.git;a=commit;h=c265cad1c95b84abfd4e8d861f25926ef13b5d91",
"refsource": "CONFIRM",
"url": "http://git.savannah.gnu.org/gitweb/?p=weechat.git;a=commit;h=c265cad1c95b84abfd4e8d861f25926ef13b5d91"
},
{
"name": "20110227 weechat does not properly use gnutls and allow an attacker to bypass certificate verification",
"refsource": "FULLDISC",
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2011-02/0671.html"
},
{
"name": "43543",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43543"
}
]
}
}