Overview
The POCO C++ Libraries NetSSL library fails to properly validate wildcard certificates, allowing an attacker to trick the victim application into trusting a malicious certificate.
Description
CWE-350: Reliance on Reverse DNS Resolution for a Security-Critical Action Guenter Obiltschnig of Applied Informatics GmbH reports: |
Impact
After a successful DNS spoofing attack, the attacker may be able to trick a SSL/TLS client into successfully validating a certificate from a malicious server. However, this requires that the certificate first passes the certificate chain validation. |
Solution
Apply an Update |
Vendor Information
CVSS Metrics
| Group | Score | Vector |
|---|---|---|
| Base | 6.4 | AV:N/AC:L/Au:N/C:P/I:P/A:N |
| Temporal | 4.7 | E:U/RL:OF/RC:C |
| Environmental | 1.2 | CDP:ND/TD:L/CR:ND/IR:ND/AR:ND |
References
Acknowledgements
Thanks to Tuomas Siren and Alexander Berezhnoy for originally discovering the vulnerability.
This document was written by Todd Lewellen.
Other Information
| CVE IDs: | CVE-2014-0350 |
| Date Public: | 2014-04-24 |
| Date First Published: | 2014-04-24 |
| Date Last Updated: | 2014-04-24 15:00 UTC |
| Document Revision: | 7 |