5.9
CVE-2016-4467
- EPSS 0.41%
- Published 02.05.2017 14:59:00
- Last modified 20.04.2025 01:37:25
- Source secalert@redhat.com
- Teams watchlist Login
- Open Login
The C client and C-based client bindings in the Apache Qpid Proton library before 0.13.1 on Windows do not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate when using the SChannel-based security layer, which allows man-in-the-middle attackers to spoof servers via an arbitrary valid certificate.
Data is provided by the National Vulnerability Database (NVD)
Apache ≫ Qpid Proton Version0.8.0
Apache ≫ Qpid Proton Version0.9.0
Apache ≫ Qpid Proton Version0.9.1
Apache ≫ Qpid Proton Version0.10.0
Apache ≫ Qpid Proton Version0.11.0
Apache ≫ Qpid Proton Version0.11.1
Apache ≫ Qpid Proton Version0.12.0
Apache ≫ Qpid Proton Version0.12.1
Apache ≫ Qpid Proton Version0.12.2
Apache ≫ Qpid Proton Version0.13.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.41% | 0.583 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 5.9 | 2.2 | 3.6 |
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
|
nvd@nist.gov | 4.3 | 8.6 | 2.9 |
AV:N/AC:M/Au:N/C:N/I:P/A:N
|
CWE-295 Improper Certificate Validation
The product does not validate, or incorrectly validates, a certificate.