[ 
https://issues.apache.org/jira/browse/CXF-5627?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13941544#comment-13941544
 ] 

Rajendrappa commented on CXF-5627:
----------------------------------

Hi,
it is mentioned  like below, please check this URL: 
http://xforce.iss.net/xforce/xfdb/79983 

Apache CXF could allow a remote attacker to conduct spoofing attacks, caused by 
the failure to verify that the server hostname matches a domain name in the 
subject's Common Name (CN) field of the X.509 certificate by the 
wsdl_first_https sample code. By persuading a victim to visit a Web site 
containing a specially-crafted certificate, an attacker could exploit this 
vulnerability using man-in-the-middle techniques to spoof an SSL server.









> Vulnerability Fix available in latets release?
> ----------------------------------------------
>
>                 Key: CXF-5627
>                 URL: https://issues.apache.org/jira/browse/CXF-5627
>             Project: CXF
>          Issue Type: Task
>    Affects Versions: 2.7.6
>            Reporter: Rajendrappa
>            Assignee: Colm O hEigeartaigh
>
> Hi,
> I want to know , the below mentioned Security Vulnerability is fixed in which 
> release.
> Title Apache CFX All Versions - SSL Hostname Check Vulnerability - 
> CVE-2012-5786



--
This message was sent by Atlassian JIRA
(v6.2#6252)

Reply via email to