Description
The getCN function in Apache Axis 1.4 and earlier does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a certificate with a subject that specifies a common name in a field that is not the CN field. NOTE: this issue exists because of an incomplete fix for CVE-2012-5784.
Published: 2014-08-27
Score: 5.8 Medium
EPSS: 1.2% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-169-1 axis security update
EUVD EUVD EUVD-2018-0677 The getCN function in Apache Axis 1.4 and earlier does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a certificate with a subject that specifies a common name in a field that is not the CN field. NOTE: this issue exists because of an incomplete fix for CVE-2012-5784.
Github GHSA Github GHSA GHSA-r53v-vm87-f72c Improper Validation of Certificates in apache axis
History

No history.

Subscriptions

Apache Axis
Redhat Enterprise Linux Jboss Enterprise Portal Platform
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-06T10:50:17.677Z

Reserved: 2014-05-14T00:00:00.000Z

Link: CVE-2014-3596

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2014-08-27T00:55:05.160

Modified: 2025-04-12T10:46:40.837

Link: CVE-2014-3596

cve-icon Redhat

Severity : Important

Publid Date: 2014-08-19T00:00:00Z

Links: CVE-2014-3596 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses