You are viewing a plain text version of this content. The canonical link for it is here.
Posted to java-dev@axis.apache.org by "Sagar (JIRA)" <ax...@ws.apache.org> on 2016/09/24 12:29:21 UTC

[jira] [Commented] (AXIS-2883) Insecure certificate validation CVE-2012-5784

    [ https://issues.apache.org/jira/browse/AXIS-2883?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15518974#comment-15518974 ] 

Sagar commented on AXIS-2883:
-----------------------------

Can you please let me know the release of Axis2 in which "CVE-2012-5785" is fixed?

> Insecure certificate validation CVE-2012-5784
> ---------------------------------------------
>
>                 Key: AXIS-2883
>                 URL: https://issues.apache.org/jira/browse/AXIS-2883
>             Project: Axis
>          Issue Type: Bug
>    Affects Versions: 1.4
>         Environment: All
>            Reporter: Alberto Fernández
>         Attachments: CVE-2012-5784-2.patch
>
>
> See. 
> http://www.cs.utexas.edu/~shmat/shmat_ccs12.pdf 
> Using JSSE you must manually validate server name you're connecting to matches one of the names provided by the certificate. So you can detect a man-in-the-middle type attack with a valid certificate for other site. 
> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5784



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

---------------------------------------------------------------------
To unsubscribe, e-mail: java-dev-unsubscribe@axis.apache.org
For additional commands, e-mail: java-dev-help@axis.apache.org