CVE-2014-3596
Summary
| CVE | CVE-2014-3596 |
|---|---|
| State | PUBLISHED |
| Assigner | redhat |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2014-08-27 00:55:05 UTC |
| Updated | 2026-05-06 22:30:45 UTC |
| Description | The getCN function in Apache Axis 1.4 and earlier does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a certificate with a subject that specifies a common name in a field that is not the CN field. NOTE: this issue exists because of an incomplete fix for CVE-2012-5784. |
Risk And Classification
Primary CVSS: v2.0 5.8 from [email protected]
AV:N/AC:M/Au:N/C:P/I:P/A:N
Problem Types: NVD-CWE-Other | n/a
CVSS v2.0 Breakdown
Access Vector
NetworkAccess Complexity
MediumAuthentication
NoneConfidentiality
PartialIntegrity
PartialAvailability
NoneAV:N/AC:M/Au:N/C:P/I:P/A:N
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Apache | Axis | 1.0 | All | All | All |
| Application | Apache | Axis | 1.0 | beta | All | All |
| Application | Apache | Axis | 1.0 | rc1 | All | All |
| Application | Apache | Axis | 1.0 | rc2 | All | All |
| Application | Apache | Axis | 1.1 | All | All | All |
| Application | Apache | Axis | 1.1 | beta | All | All |
| Application | Apache | Axis | 1.1 | rc1 | All | All |
| Application | Apache | Axis | 1.1 | rc2 | All | All |
| Application | Apache | Axis | 1.2 | All | All | All |
| Application | Apache | Axis | 1.2 | alpha | All | All |
| Application | Apache | Axis | 1.2 | beta1 | All | All |
| Application | Apache | Axis | 1.2 | beta2 | All | All |
| Application | Apache | Axis | 1.2 | beta3 | All | All |
| Application | Apache | Axis | 1.2 | rc1 | All | All |
| Application | Apache | Axis | 1.2 | rc2 | All | All |
| Application | Apache | Axis | 1.2 | rc3 | All | All |
| Application | Apache | Axis | 1.2.1 | All | All | All |
| Application | Apache | Axis | 1.3 | All | All | All |
| Application | Apache | Axis | All | All | All | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| IBM X-Force Exchange | af854a3a-2127-422b-91ae-364da2661108 | exchange.xforce.ibmcloud.com | |
| Pony Mail! | af854a3a-2127-422b-91ae-364da2661108 | lists.apache.org | |
| [security-announce] openSUSE-SU-2019:1526-1: moderate: Security update f | af854a3a-2127-422b-91ae-364da2661108 | lists.opensuse.org | |
| Pony Mail! | af854a3a-2127-422b-91ae-364da2661108 | lists.apache.org | |
| Pony Mail! | af854a3a-2127-422b-91ae-364da2661108 | lists.apache.org | |
| Red Hat Customer Portal | af854a3a-2127-422b-91ae-364da2661108 | rhn.redhat.com | |
| Apache Axis Incomplete Fix CVE-2014-3596 SSL Certificate Validation Security Bypass Vulnerability | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | |
| [security-announce] openSUSE-SU-2019:1497-1: moderate: Security update f | af854a3a-2127-422b-91ae-364da2661108 | lists.opensuse.org | |
| oss-security - CVE-2014-3596 - Apache Axis 1 vulnerable to MITM attack | af854a3a-2127-422b-91ae-364da2661108 | www.openwall.com | |
| Apache Axis Certificate Validation Flaw Lets Remote Users Spoof Server Certificates - SecurityTracker | af854a3a-2127-422b-91ae-364da2661108 | www.securitytracker.com | |
| [AXIS-2905] Insecure certificate validation CVE-2014-3596 - ASF JIRA | af854a3a-2127-422b-91ae-364da2661108 | issues.apache.org | Patch |
| Pony Mail! | af854a3a-2127-422b-91ae-364da2661108 | lists.apache.org | |
| linux.oracle.com | ELSA-2014-1193 | af854a3a-2127-422b-91ae-364da2661108 | linux.oracle.com | |
| Security Advisory SA61222 - Oracle Linux update for axis - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| Oracle Critical Patch Update Advisory - January 2020 | af854a3a-2127-422b-91ae-364da2661108 | www.oracle.com | |
| Pony Mail! | af854a3a-2127-422b-91ae-364da2661108 | lists.apache.org | |
| Red Hat Customer Portal | MITRE | access.redhat.com | |
| Red Hat Customer Portal | MITRE | access.redhat.com | |
| CVE-2014-3596 - Red Hat Customer Portal | MITRE | access.redhat.com | |
| 1129935 – (CVE-2014-3596) CVE-2014-3596 axis: SSL hostname verification bypass, incomplete CVE-2012-5784 fix | MITRE | bugzilla.redhat.com | |
| Pony Mail! | MITRE | lists.apache.org | |
| Pony Mail! | MITRE | lists.apache.org | |
| Pony Mail! | MITRE | lists.apache.org | |
| Pony Mail! | MITRE | lists.apache.org | |
| Pony Mail! | MITRE | lists.apache.org | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.