CVE-2014-3504 : Detail

CVE-2014-3504

0.1%V3
Network
2014-08-19
16h00 +00:00
2017-06-30
14h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

The (1) serf_ssl_cert_issuer, (2) serf_ssl_cert_subject, and (3) serf_ssl_cert_certificate functions in Serf 0.2.0 through 1.3.x before 1.3.7 does not properly handle a NUL byte in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 4 AV:N/AC:H/Au:N/C:P/I:P/A:N nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Products Mentioned

Configuraton 0

Apache>>Subversion >> Version 1.4.0

Apache>>Subversion >> Version 1.4.1

Apache>>Subversion >> Version 1.4.2

Apache>>Subversion >> Version 1.4.3

Apache>>Subversion >> Version 1.4.4

Apache>>Subversion >> Version 1.4.5

Apache>>Subversion >> Version 1.4.6

Apache>>Subversion >> Version 1.5.0

Apache>>Subversion >> Version 1.5.1

Apache>>Subversion >> Version 1.5.2

Apache>>Subversion >> Version 1.5.3

Apache>>Subversion >> Version 1.5.4

Apache>>Subversion >> Version 1.5.5

Apache>>Subversion >> Version 1.5.6

Apache>>Subversion >> Version 1.5.7

Apache>>Subversion >> Version 1.5.8

Apache>>Subversion >> Version 1.6.0

Apache>>Subversion >> Version 1.6.1

Apache>>Subversion >> Version 1.6.2

Apache>>Subversion >> Version 1.6.3

Apache>>Subversion >> Version 1.6.4

Apache>>Subversion >> Version 1.6.5

Apache>>Subversion >> Version 1.6.6

Apache>>Subversion >> Version 1.6.7

Apache>>Subversion >> Version 1.6.8

Apache>>Subversion >> Version 1.6.9

Apache>>Subversion >> Version 1.6.10

Apache>>Subversion >> Version 1.6.11

Apache>>Subversion >> Version 1.6.12

Apache>>Subversion >> Version 1.6.13

Apache>>Subversion >> Version 1.6.14

Apache>>Subversion >> Version 1.6.15

Apache>>Subversion >> Version 1.6.16

Apache>>Subversion >> Version 1.6.17

Apache>>Subversion >> Version 1.6.18

Apache>>Subversion >> Version 1.6.19

Apache>>Subversion >> Version 1.6.20

Apache>>Subversion >> Version 1.6.21

Apache>>Subversion >> Version 1.6.23

Apache>>Subversion >> Version 1.7.0

Apache>>Subversion >> Version 1.7.1

Apache>>Subversion >> Version 1.7.2

Apache>>Subversion >> Version 1.7.3

Apache>>Subversion >> Version 1.7.4

Apache>>Subversion >> Version 1.7.5

Apache>>Subversion >> Version 1.7.6

Apache>>Subversion >> Version 1.7.7

Apache>>Subversion >> Version 1.7.8

Apache>>Subversion >> Version 1.7.9

Apache>>Subversion >> Version 1.7.10

Apache>>Subversion >> Version 1.7.11

Apache>>Subversion >> Version 1.7.12

Apache>>Subversion >> Version 1.7.13

Apache>>Subversion >> Version 1.7.14

Apache>>Subversion >> Version 1.7.15

Apache>>Subversion >> Version 1.7.16

Apache>>Subversion >> Version 1.7.17

Apache>>Subversion >> Version 1.8.0

Apache>>Subversion >> Version 1.8.1

Apache>>Subversion >> Version 1.8.2

Apache>>Subversion >> Version 1.8.3

Apache>>Subversion >> Version 1.8.4

Apache>>Subversion >> Version 1.8.5

Apache>>Subversion >> Version 1.8.6

Apache>>Subversion >> Version 1.8.7

Apache>>Subversion >> Version 1.8.8

Apache>>Subversion >> Version 1.8.9

Configuraton 0

Canonical>>Ubuntu_linux >> Version 12.04

Canonical>>Ubuntu_linux >> Version 14.04

Configuraton 0

Serf_project>>Serf >> Version 0.2.0

Serf_project>>Serf >> Version 0.3.0

Serf_project>>Serf >> Version 0.3.1

Serf_project>>Serf >> Version 0.4.0

Serf_project>>Serf >> Version 0.5.0

Serf_project>>Serf >> Version 0.6.0

Serf_project>>Serf >> Version 0.6.1

Serf_project>>Serf >> Version 0.7.0

Serf_project>>Serf >> Version 0.7.1

Serf_project>>Serf >> Version 0.7.2

Serf_project>>Serf >> Version 1.0.0

Serf_project>>Serf >> Version 1.0.1

Serf_project>>Serf >> Version 1.0.2

Serf_project>>Serf >> Version 1.0.3

Serf_project>>Serf >> Version 1.1.0

Serf_project>>Serf >> Version 1.1.1

Serf_project>>Serf >> Version 1.2.0

Serf_project>>Serf >> Version 1.2.1

Serf_project>>Serf >> Version 1.3.0

Serf_project>>Serf >> Version 1.3.1

Serf_project>>Serf >> Version 1.3.2

Serf_project>>Serf >> Version 1.3.3

Serf_project>>Serf >> Version 1.3.4

Serf_project>>Serf >> Version 1.3.5

Serf_project>>Serf >> Version 1.3.6

References

http://ubuntu.com/usn/usn-2315-1
Tags : vendor-advisory, x_refsource_UBUNTU
http://www.securityfocus.com/bid/69238
Tags : vdb-entry, x_refsource_BID
http://secunia.com/advisories/60721
Tags : third-party-advisory, x_refsource_SECUNIA
https://security.gentoo.org/glsa/201610-05
Tags : vendor-advisory, x_refsource_GENTOO
http://secunia.com/advisories/59584
Tags : third-party-advisory, x_refsource_SECUNIA