fkie_cve-2009-3490
Vulnerability from fkie_nvd
Published
2009-09-30 15:30
Modified
2024-11-21 01:07
Severity ?
Summary
GNU Wget before 1.12 does not properly handle a '\0' character in a domain name in the Common Name field of an X.509 certificate, which allows man-in-the-middle remote attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
References
cve@mitre.orghttp://addictivecode.org/pipermail/wget-notify/2009-August/001808.html
cve@mitre.orghttp://hg.addictivecode.org/wget/mainline/rev/1eab157d3be7
cve@mitre.orghttp://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
cve@mitre.orghttp://marc.info/?l=oss-security&m=125198917018936&w=2
cve@mitre.orghttp://marc.info/?l=oss-security&m=125369675820512&w=2
cve@mitre.orghttp://permalink.gmane.org/gmane.comp.web.wget.general/8972
cve@mitre.orghttp://secunia.com/advisories/36540Vendor Advisory
cve@mitre.orghttp://www.securityfocus.com/bid/36205
cve@mitre.orghttp://www.vupen.com/english/advisories/2009/2498Vendor Advisory
cve@mitre.orghttps://bugzilla.redhat.com/show_bug.cgi?id=520454
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11099
af854a3a-2127-422b-91ae-364da2661108http://addictivecode.org/pipermail/wget-notify/2009-August/001808.html
af854a3a-2127-422b-91ae-364da2661108http://hg.addictivecode.org/wget/mainline/rev/1eab157d3be7
af854a3a-2127-422b-91ae-364da2661108http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=oss-security&m=125198917018936&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=oss-security&m=125369675820512&w=2
af854a3a-2127-422b-91ae-364da2661108http://permalink.gmane.org/gmane.comp.web.wget.general/8972
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/36540Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/36205
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2009/2498Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=520454
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11099
Impacted products
Vendor Product Version
gnu wget *
gnu wget 1.5.3
gnu wget 1.6
gnu wget 1.7
gnu wget 1.7.1
gnu wget 1.8
gnu wget 1.8.1
gnu wget 1.9
gnu wget 1.9.1
gnu wget 1.10
gnu wget 1.10.1
gnu wget 1.10.2
gnu wget 1.11
gnu wget 1.11.1
gnu wget 1.11.2
gnu wget 1.11.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:gnu:wget:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD0AF9BA-677F-423E-A9B2-0BEBA4A2E86A",
              "versionEndIncluding": "1.11.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:wget:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "50DD71F2-0B3C-4082-950A-CBFA5C601AEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:wget:1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "26B3B1B6-3985-4479-93B2-14E1AB52F768",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:wget:1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "0BC975AA-0F98-4A3A-B3B4-2152156327D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:wget:1.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DEDFB88-C435-4FB9-838D-8199690A8F70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:wget:1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5BF2616-A99A-4229-A8A6-655155ED5EB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:wget:1.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A14454E-DDAE-4115-8323-8BB4E17DF208",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:wget:1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "F88CD81A-7804-4316-8581-41689A318D56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:wget:1.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BE0FCE2-ABB9-4943-96AE-C81277014396",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:wget:1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDE8FE2E-40EF-4B86-A01E-7777FBDABB59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:wget:1.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E097843-1854-4C5E-BB27-07280EB3EEB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:wget:1.10.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1047974D-7A5D-4533-996B-2B09EC7E8789",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:wget:1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "C40562DA-2B50-4B30-B0D8-B62913FCC680",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:wget:1.11.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5B63798-366A-4778-987D-19307228E13B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:wget:1.11.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "90DEBAA0-B537-4EEC-8EA2-E503F26A0496",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:wget:1.11.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEC161C5-5247-4A3C-AB56-6562B0A65D21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "GNU Wget before 1.12 does not properly handle a \u0027\\0\u0027 character in a domain name in the Common Name field of an X.509 certificate, which allows man-in-the-middle remote attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408."
    },
    {
      "lang": "es",
      "value": "GNU Wget, en versiones anteriores a la 1.12 no maneja adecuadamente un caracter \u0027\\0\u0027 en un nombre de dominio, en el campo Common Name de una certificado X.509, lo cual permite a atacantes hombre-en-el-medio (man-in-the-middle) remotos suplantar servidores SSL a su elecci\u00f3n a trav\u00e9s de de un certificado manipulado expedido por una Autoridad de Certificaci\u00f3n leg\u00edtima, un tema relacionado con CVE-2009-2408."
    }
  ],
  "id": "CVE-2009-3490",
  "lastModified": "2024-11-21T01:07:29.430",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2009-09-30T15:30:00.610",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://addictivecode.org/pipermail/wget-notify/2009-August/001808.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://hg.addictivecode.org/wget/mainline/rev/1eab157d3be7"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=oss-security\u0026m=125198917018936\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=oss-security\u0026m=125369675820512\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://permalink.gmane.org/gmane.comp.web.wget.general/8972"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/36540"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/36205"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/2498"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=520454"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11099"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://addictivecode.org/pipermail/wget-notify/2009-August/001808.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://hg.addictivecode.org/wget/mainline/rev/1eab157d3be7"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=oss-security\u0026m=125198917018936\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=oss-security\u0026m=125369675820512\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://permalink.gmane.org/gmane.comp.web.wget.general/8972"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/36540"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/36205"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/2498"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=520454"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11099"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-310"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.