2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2013-1909" ,
"sourceIdentifier" : "secalert@redhat.com" ,
"published" : "2013-08-23T16:55:07.063" ,
2024-11-22 19:15:24 +00:00
"lastModified" : "2024-11-21T01:50:38.163" ,
"vulnStatus" : "Modified" ,
2024-12-08 03:06:42 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "The Python client in Apache Qpid before 2.2 does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate."
} ,
{
"lang" : "es" ,
"value" : "El cliente Python en Apache Qpid anterior a v2.2 no verifica que el nombre del servidor coincide con un nombre de dominio en el nombre com\u00fan del sujeto (CN) o el campo subjectAltName del certificado X.509, permitiendo a los atacantes de hombre-en-medio (man-in-the-middle) falsificar servidores SSL mediante un certificado v\u00e1lido de su elecci\u00f3n."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:M/Au:N/C:P/I:P/A:N" ,
2024-11-22 19:15:24 +00:00
"baseScore" : 5.8 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "MEDIUM" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "PARTIAL" ,
"integrityImpact" : "PARTIAL" ,
2024-11-22 19:15:24 +00:00
"availabilityImpact" : "NONE"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 8.6 ,
"impactScore" : 4.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-20"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_mrg:2.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C60FA8B1-1802-4522-A088-22171DCF7A93"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:qpid:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "0.20" ,
"matchCriteriaId" : "2EFF35CD-0D3D-4B29-8E7A-9C39D7358A3A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:qpid:0.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "71A147B7-2E6B-4E7A-8C68-BEDFCACD57AD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:qpid:0.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "760A5796-9BB5-45A3-AB0E-D3639D487A76"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:qpid:0.7:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D441FDC2-CA4E-43C5-A3DD-3715641E59A4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:qpid:0.8:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "79CB1E30-BDD9-451E-A366-EE19C2E00AF0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:qpid:0.9:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8690F211-CE64-4799-87C5-F2AEDB0500EA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:qpid:0.10:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "469FC441-523B-4C78-9B2D-46B8CCE8811E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:qpid:0.11:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BB64A222-C258-44BF-A83D-CFE1204F8009"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:qpid:0.12:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C584B299-0BB9-4B4F-B0BC-11DE222F1F17"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:qpid:0.13:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D74323FF-612A-48EE-A03E-D49CAD828101"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:qpid:0.14:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "21261207-0DF5-460A-9F9B-F8CADB78DAF7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:qpid:0.15:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F5A6F2E8-325C-4071-9862-8242B730B147"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:qpid:0.16:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "578FB3FD-EA55-4A39-94D4-F4194C0F2BB3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:qpid:0.17:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C67B5857-3CD8-445A-B60D-C0285BB60A07"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:qpid:0.18:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2949A7DC-2955-4770-94CE-5AB9EEC3B1DB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:qpid:0.19:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B227D078-8298-4594-8F96-F2976F189B6A"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://qpid.apache.org/releases/qpid-0.22/release-notes.html" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1024.html" ,
"source" : "secalert@redhat.com"
} ,
2024-04-04 08:46:00 +00:00
{
"url" : "http://secunia.com/advisories/53968" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/54137" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Vendor Advisory"
]
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://svn.apache.org/viewvc?view=revision&revision=1460013" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "https://issues.apache.org/jira/browse/QPID-4918" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Patch"
]
2024-11-22 19:15:24 +00:00
} ,
{
"url" : "http://qpid.apache.org/releases/qpid-0.22/release-notes.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1024.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://secunia.com/advisories/53968" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/54137" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://svn.apache.org/viewvc?view=revision&revision=1460013" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "https://issues.apache.org/jira/browse/QPID-4918" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch"
]
2023-04-24 12:24:31 +02:00
}
]
}