CVE-2012-3446
Publication date 4 November 2012
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
Apache Libcloud before 0.11.1 uses an incorrect regular expression during verification of whether the server hostname matches a domain name in the subject’s Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a crafted certificate.
Status
Package | Ubuntu Release | Status |
---|---|---|
libcloud | 13.10 saucy |
Fixed 0.5.0-1.1
|
13.04 raring |
Fixed 0.5.0-1.1
|
|
12.10 quantal |
Fixed 0.5.0-1.1
|
|
12.04 LTS precise |
Fixed 0.5.0-1.1~build0.12.04.1
|
|
11.10 oneiric |
Fixed 0.5.0-1.1~build0.11.10.1
|
|
11.04 natty | Ignored end of life | |
10.04 LTS lucid | Ignored end of life | |
8.04 LTS hardy | Not in release |
Severity score breakdown
Parameter | Value |
---|---|
Base score |
|
Attack vector | Network |
Attack complexity | High |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | High |
Availability impact | None |
Vector | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N |