CVE-2014-3596
Summary
| CVE | CVE-2014-3596 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2014-08-27 00:55:00 UTC |
| Updated | 2023-02-13 00:40:00 UTC |
| Description | The getCN function in Apache Axis 1.4 and earlier does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a certificate with a subject that specifies a common name in a field that is not the CN field. NOTE: this issue exists because of an incomplete fix for CVE-2012-5784. |
Risk And Classification
Problem Types: NVD-CWE-Other
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Apache | Axis | 1.0 | All | All | All |
| Application | Apache | Axis | 1.0 | beta | All | All |
| Application | Apache | Axis | 1.0 | rc1 | All | All |
| Application | Apache | Axis | 1.0 | rc2 | All | All |
| Application | Apache | Axis | 1.1 | All | All | All |
| Application | Apache | Axis | 1.1 | beta | All | All |
| Application | Apache | Axis | 1.1 | rc1 | All | All |
| Application | Apache | Axis | 1.1 | rc2 | All | All |
| Application | Apache | Axis | 1.2 | All | All | All |
| Application | Apache | Axis | 1.2 | alpha | All | All |
| Application | Apache | Axis | 1.2 | beta1 | All | All |
| Application | Apache | Axis | 1.2 | beta2 | All | All |
| Application | Apache | Axis | 1.2 | beta3 | All | All |
| Application | Apache | Axis | 1.2 | rc1 | All | All |
| Application | Apache | Axis | 1.2 | rc2 | All | All |
| Application | Apache | Axis | 1.2 | rc3 | All | All |
| Application | Apache | Axis | 1.2.1 | All | All | All |
| Application | Apache | Axis | 1.3 | All | All | All |
| Application | Apache | Axis | 1.0 | All | All | All |
| Application | Apache | Axis | 1.0 | beta | All | All |
| Application | Apache | Axis | 1.0 | rc1 | All | All |
| Application | Apache | Axis | 1.0 | rc2 | All | All |
| Application | Apache | Axis | 1.1 | All | All | All |
| Application | Apache | Axis | 1.1 | beta | All | All |
| Application | Apache | Axis | 1.1 | rc1 | All | All |
| Application | Apache | Axis | 1.1 | rc2 | All | All |
| Application | Apache | Axis | 1.2 | All | All | All |
| Application | Apache | Axis | 1.2 | alpha | All | All |
| Application | Apache | Axis | 1.2 | beta1 | All | All |
| Application | Apache | Axis | 1.2 | beta2 | All | All |
| Application | Apache | Axis | 1.2 | beta3 | All | All |
| Application | Apache | Axis | 1.2 | rc1 | All | All |
| Application | Apache | Axis | 1.2 | rc2 | All | All |
| Application | Apache | Axis | 1.2 | rc3 | All | All |
| Application | Apache | Axis | 1.2.1 | All | All | All |
| Application | Apache | Axis | 1.3 | All | All | All |
| Application | Apache | Axis | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| linux.oracle.com | ELSA-2014-1193 | CONFIRM | linux.oracle.com | |
| IBM X-Force Exchange | XF | exchange.xforce.ibmcloud.com | |
| Pony Mail! | MLIST | lists.apache.org | |
| Security Advisory SA61222 - Oracle Linux update for axis - Secunia | SECUNIA | secunia.com | |
| Apache Axis Incomplete Fix CVE-2014-3596 SSL Certificate Validation Security Bypass Vulnerability | BID | www.securityfocus.com | |
| Pony Mail! | MISC | lists.apache.org | |
| Pony Mail! | MLIST | lists.apache.org | |
| Apache Axis Certificate Validation Flaw Lets Remote Users Spoof Server Certificates - SecurityTracker | SECTRACK | www.securitytracker.com | |
| Pony Mail! | MISC | lists.apache.org | |
| Red Hat Customer Portal | MISC | access.redhat.com | |
| [security-announce] openSUSE-SU-2019:1497-1: moderate: Security update f | SUSE | lists.opensuse.org | |
| Red Hat Customer Portal | REDHAT | rhn.redhat.com | |
| [security-announce] openSUSE-SU-2019:1526-1: moderate: Security update f | SUSE | lists.opensuse.org | |
| Pony Mail! | MLIST | lists.apache.org | |
| Pony Mail! | MISC | lists.apache.org | |
| Pony Mail! | MLIST | lists.apache.org | |
| Pony Mail! | MISC | lists.apache.org | |
| [AXIS-2905] Insecure certificate validation CVE-2014-3596 - ASF JIRA | MISC | issues.apache.org | Patch |
| oss-security - CVE-2014-3596 - Apache Axis 1 vulnerable to MITM attack | MLIST | www.openwall.com | |
| Pony Mail! | MISC | lists.apache.org | |
| Oracle Critical Patch Update Advisory - January 2020 | MISC | www.oracle.com | |
| 1129935 – (CVE-2014-3596) CVE-2014-3596 axis: SSL hostname verification bypass, incomplete CVE-2012-5784 fix | MISC | bugzilla.redhat.com | |
| Red Hat Customer Portal | MISC | access.redhat.com | |
| Pony Mail! | MLIST | lists.apache.org | |
| CVE-2014-3596 - Red Hat Customer Portal | MISC | access.redhat.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.