CVE-2018-8970
Summary
| CVE | CVE-2018-8970 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2018-03-24 21:29:00 UTC |
| Updated | 2018-04-24 16:40:00 UTC |
| Description | The int_x509_param_set_hosts function in lib/libcrypto/x509/x509_vpm.c in LibreSSL 2.7.0 before 2.7.1 does not support a certain special case of a zero name length, which causes silent omission of hostname verification, and consequently allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. NOTE: the LibreSSL documentation indicates that this special case is supported, but the BoringSSL documentation does not. |
Risk And Classification
Problem Types: CWE-295
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Call strlen() if name length provided is 0, like OpenSSL does. · libressl-portable/openbsd@0654414 · GitHub | MISC | github.com | Patch, Third Party Advisory |
| ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-2.7.1-relnotes.txt | MISC | ftp.openbsd.org | Vendor Advisory |
| e759a9cd84198613199259dbed401f4951747cff - boringssl - Git at Google | MISC | boringssl.googlesource.com | Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.