Upstream information

CVE-2009-3639 at MITRE

Description

The mod_tls module in ProFTPD before 1.3.2b, and 1.3.3 before 1.3.3rc2, when the dNSNameRequired TLS option is enabled, does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 client certificate, which allows remote attackers to bypass intended client-hostname restrictions via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.

SUSE information

Overall state of this security issue: Does not affect SUSE products

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 5.8
Vector AV:N/AC:M/Au:N/C:N/I:P/A:P
Access Vector Network
Access Complexity Medium
Authentication None
Confidentiality Impact None
Integrity Impact Partial
Availability Impact Partial
SUSE Bugzilla entries: 549740 [VERIFIED / FIXED], 549741 [CLOSED / DUPLICATE]

No SUSE Security Announcements cross referenced.

List of released packages

Product(s) Fixed package version(s) References
openSUSE Tumbleweed
  • proftpd >= 1.3.5b-2.5
  • proftpd-devel >= 1.3.5b-2.5
  • proftpd-doc >= 1.3.5b-2.5
  • proftpd-lang >= 1.3.5b-2.5
  • proftpd-ldap >= 1.3.5b-2.5
  • proftpd-mysql >= 1.3.5b-2.5
  • proftpd-pgsql >= 1.3.5b-2.5
  • proftpd-radius >= 1.3.5b-2.5
  • proftpd-sqlite >= 1.3.5b-2.5
Patchnames:
openSUSE Tumbleweed GA proftpd-1.3.5b-2.5


SUSE Timeline for this CVE

CVE page created: Tue Jul 9 17:10:41 2013
CVE page last modified: Fri Oct 7 12:45:50 2022