vulnerability
SUSE: CVE-2018-8970: SUSE Linux Security Advisory
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 6 | (AV:N/AC:M/Au:N/C:P/I:P/A:N) | Mar 24, 2018 | Sep 4, 2018 | May 29, 2021 |
Severity
6
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:N)
Published
Mar 24, 2018
Added
Sep 4, 2018
Modified
May 29, 2021
Description
The int_x509_param_set_hosts function in lib/libcrypto/x509/x509_vpm.c in LibreSSL 2.7.0 before 2.7.1 does not support a certain special case of a zero name length, which causes silent omission of hostname verification, and consequently allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. NOTE: the LibreSSL documentation indicates that this special case is supported, but the BoringSSL documentation does not.
Solutions
suse-upgrade-libcrypto43suse-upgrade-libcrypto43-32bitsuse-upgrade-libcrypto43-debuginfosuse-upgrade-libcrypto43-debuginfo-32bitsuse-upgrade-libresslsuse-upgrade-libressl-debuginfosuse-upgrade-libressl-debugsourcesuse-upgrade-libressl-develsuse-upgrade-libressl-devel-32bitsuse-upgrade-libressl-devel-docsuse-upgrade-libssl45suse-upgrade-libssl45-32bitsuse-upgrade-libssl45-debuginfosuse-upgrade-libssl45-debuginfo-32bitsuse-upgrade-libtls17suse-upgrade-libtls17-32bitsuse-upgrade-libtls17-debuginfosuse-upgrade-libtls17-debuginfo-32bit
References
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.