[
https://issues.apache.org/jira/browse/FALCON-1979?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15299171#comment-15299171
]
ASF GitHub Bot commented on FALCON-1979:
----------------------------------------
Github user asfgit closed the pull request at:
https://github.com/apache/falcon/pull/159
> Update HttpClient versions to close security vulnerabilities
> ------------------------------------------------------------
>
> Key: FALCON-1979
> URL: https://issues.apache.org/jira/browse/FALCON-1979
> Project: Falcon
> Issue Type: Bug
> Reporter: Balu Vellanki
> Assignee: Balu Vellanki
> Fix For: trunk
>
>
> We learned that
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-5262 :
> http/conn/ssl/SSLConnectionSocketFactory.java in Apache HttpComponents
> HttpClient before 4.3.6 ignores the http.socket.timeout configuration setting
> during an SSL handshake, which allows remote attackers to cause a denial of
> service (HTTPS call hang) via unspecified vectors.
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-6153
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-5783
> Apache Commons HttpClient 3.x, as used in Amazon Flexible Payments Service
> (FPS) merchant Java SDK and other products, does not verify that the server
> hostname matches a domain name in the subject's Common Name (CN) or
> subjectAltName field of the X.509 certificate, which allows man-in-the-middle
> attackers to spoof SSL servers via an arbitrary valid certificate.
> Hence, HttpClient version should be updated.
--
This message was sent by Atlassian JIRA
(v6.3.4#6332)