You are viewing a plain text version of this content. The canonical link for it is here.
Posted to java-dev@axis.apache.org by "Alberto Fernández (JIRA)" <ax...@ws.apache.org> on 2012/11/23 00:26:57 UTC
[jira] [Created] (AXIS-2883) Insecure certificate validation
CVE-2012-5784
Alberto Fernández created AXIS-2883:
---------------------------------------
Summary: Insecure certificate validation CVE-2012-5784
Key: AXIS-2883
URL: https://issues.apache.org/jira/browse/AXIS-2883
Project: Axis
Issue Type: Bug
Affects Versions: 1.4
Environment: All
Reporter: Alberto Fernández
Attachments: CVE-2012-5784.patch
See.
http://www.cs.utexas.edu/~shmat/shmat_ccs12.pdf
Using JSSE you must manually validate server name you're connecting to matches one of the names provided by the certificate. So you can detect a man-in-the-middle type attack with a valid certificate for other site.
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5784
--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira
---------------------------------------------------------------------
To unsubscribe, e-mail: java-dev-unsubscribe@axis.apache.org
For additional commands, e-mail: java-dev-help@axis.apache.org
[jira] [Updated] (AXIS-2883) Insecure certificate validation
CVE-2012-5784
Posted by "Alberto Fernández (JIRA)" <ax...@ws.apache.org>.
[ https://issues.apache.org/jira/browse/AXIS-2883?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Alberto Fernández updated AXIS-2883:
------------------------------------
Attachment: CVE-2012-5784.patch
Patch that validates certificate DNSSubjectAlts/CN matches the server name we are trying to connect to
> Insecure certificate validation CVE-2012-5784
> ---------------------------------------------
>
> Key: AXIS-2883
> URL: https://issues.apache.org/jira/browse/AXIS-2883
> Project: Axis
> Issue Type: Bug
> Affects Versions: 1.4
> Environment: All
> Reporter: Alberto Fernández
> Attachments: CVE-2012-5784.patch
>
>
> See.
> http://www.cs.utexas.edu/~shmat/shmat_ccs12.pdf
> Using JSSE you must manually validate server name you're connecting to matches one of the names provided by the certificate. So you can detect a man-in-the-middle type attack with a valid certificate for other site.
> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5784
--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira
---------------------------------------------------------------------
To unsubscribe, e-mail: java-dev-unsubscribe@axis.apache.org
For additional commands, e-mail: java-dev-help@axis.apache.org