CVE-2018-8970

The int_x509_param_set_hosts function in lib/libcrypto/x509/x509_vpm.c in LibreSSL 2.7.0 before 2.7.1 does not support a certain special case of a zero name length, which causes silent omission of hostname verification, and consequently allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. NOTE: the LibreSSL documentation indicates that this special case is supported, but the BoringSSL documentation does not.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openbsd:libressl:2.7.0:*:*:*:*:*:*:*

History

21 Nov 2024, 04:14

Type Values Removed Values Added
References () https://boringssl.googlesource.com/boringssl/+/e759a9cd84198613199259dbed401f4951747cff - Third Party Advisory () https://boringssl.googlesource.com/boringssl/+/e759a9cd84198613199259dbed401f4951747cff - Third Party Advisory
References () https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-2.7.1-relnotes.txt - Vendor Advisory () https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-2.7.1-relnotes.txt - Vendor Advisory
References () https://github.com/libressl-portable/openbsd/commit/0654414afcce51a16d35d05060190a3ec4618d42 - Patch, Third Party Advisory () https://github.com/libressl-portable/openbsd/commit/0654414afcce51a16d35d05060190a3ec4618d42 - Patch, Third Party Advisory

Information

Published : 2018-03-24 21:29

Updated : 2024-11-21 04:14


NVD link : CVE-2018-8970

Mitre link : CVE-2018-8970

CVE.ORG link : CVE-2018-8970


JSON object : View

Products Affected

openbsd

  • libressl
CWE
CWE-295

Improper Certificate Validation