CVE-2011-1428

Wee Enhanced Environment for Chat (aka WeeChat) 0.3.4 and earlier does not properly verify that the server hostname matches the domain name of the subject of an X.509 certificate, which allows man-in-the-middle attackers to spoof an SSL chat server via an arbitrary certificate, related to incorrect use of the GnuTLS API.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:flashtux:weechat:*:*:*:*:*:*:*:*
cpe:2.3:a:flashtux:weechat:0.0.1:*:*:*:*:*:*:*
cpe:2.3:a:flashtux:weechat:0.0.2:*:*:*:*:*:*:*
cpe:2.3:a:flashtux:weechat:0.0.3:*:*:*:*:*:*:*
cpe:2.3:a:flashtux:weechat:0.0.4:*:*:*:*:*:*:*
cpe:2.3:a:flashtux:weechat:0.0.5:*:*:*:*:*:*:*
cpe:2.3:a:flashtux:weechat:0.0.6:*:*:*:*:*:*:*
cpe:2.3:a:flashtux:weechat:0.0.7:*:*:*:*:*:*:*
cpe:2.3:a:flashtux:weechat:0.0.8:*:*:*:*:*:*:*
cpe:2.3:a:flashtux:weechat:0.0.9:*:*:*:*:*:*:*
cpe:2.3:a:flashtux:weechat:0.1.0:*:*:*:*:*:*:*
cpe:2.3:a:flashtux:weechat:0.1.1:*:*:*:*:*:*:*
cpe:2.3:a:flashtux:weechat:0.1.2:*:*:*:*:*:*:*
cpe:2.3:a:flashtux:weechat:0.1.3:*:*:*:*:*:*:*
cpe:2.3:a:flashtux:weechat:0.1.4:*:*:*:*:*:*:*
cpe:2.3:a:flashtux:weechat:0.1.5:*:*:*:*:*:*:*
cpe:2.3:a:flashtux:weechat:0.1.6:*:*:*:*:*:*:*
cpe:2.3:a:flashtux:weechat:0.1.7:*:*:*:*:*:*:*
cpe:2.3:a:flashtux:weechat:0.1.8:*:*:*:*:*:*:*
cpe:2.3:a:flashtux:weechat:0.1.9:*:*:*:*:*:*:*
cpe:2.3:a:flashtux:weechat:0.2.0:*:*:*:*:*:*:*
cpe:2.3:a:flashtux:weechat:0.2.1:*:*:*:*:*:*:*
cpe:2.3:a:flashtux:weechat:0.2.2:*:*:*:*:*:*:*
cpe:2.3:a:flashtux:weechat:0.2.3:*:*:*:*:*:*:*
cpe:2.3:a:flashtux:weechat:0.2.4:*:*:*:*:*:*:*
cpe:2.3:a:flashtux:weechat:0.2.5:*:*:*:*:*:*:*
cpe:2.3:a:flashtux:weechat:0.2.6:*:*:*:*:*:*:*
cpe:2.3:a:flashtux:weechat:0.2.6.1:*:*:*:*:*:*:*
cpe:2.3:a:flashtux:weechat:0.2.6.2:*:*:*:*:*:*:*
cpe:2.3:a:flashtux:weechat:0.2.6.3:*:*:*:*:*:*:*
cpe:2.3:a:flashtux:weechat:0.3.0:*:*:*:*:*:*:*
cpe:2.3:a:flashtux:weechat:0.3.1:*:*:*:*:*:*:*
cpe:2.3:a:flashtux:weechat:0.3.1.1:*:*:*:*:*:*:*
cpe:2.3:a:flashtux:weechat:0.3.2:*:*:*:*:*:*:*
cpe:2.3:a:flashtux:weechat:0.3.3:*:*:*:*:*:*:*

History

21 Nov 2024, 01:26

Type Values Removed Values Added
References () http://archives.neohapsis.com/archives/fulldisclosure/2011-02/0671.html - Exploit () http://archives.neohapsis.com/archives/fulldisclosure/2011-02/0671.html - Exploit
References () http://git.savannah.gnu.org/gitweb/?p=weechat.git%3Ba=commit%3Bh=c265cad1c95b84abfd4e8d861f25926ef13b5d91 - () http://git.savannah.gnu.org/gitweb/?p=weechat.git%3Ba=commit%3Bh=c265cad1c95b84abfd4e8d861f25926ef13b5d91 -
References () http://savannah.nongnu.org/patch/index.php?7459 - Exploit, Patch () http://savannah.nongnu.org/patch/index.php?7459 - Exploit, Patch
References () http://secunia.com/advisories/43543 - Vendor Advisory () http://secunia.com/advisories/43543 - Vendor Advisory
References () http://www.securityfocus.com/bid/46612 - () http://www.securityfocus.com/bid/46612 -

Information

Published : 2011-03-16 22:55

Updated : 2024-11-21 01:26


NVD link : CVE-2011-1428

Mitre link : CVE-2011-1428

CVE.ORG link : CVE-2011-1428


JSON object : View

Products Affected

flashtux

  • weechat
CWE
CWE-20

Improper Input Validation