Vulnerability Details : CVE-2014-0350
The Poco::Net::X509Certificate::verify method in the NetSSL library in POCO C++ Libraries before 1.4.6p4 allows man-in-the-middle attackers to spoof SSL servers via crafted DNS PTR records that are requested during comparison of a server name to a wildcard domain name in an X.509 certificate.
Products affected by CVE-2014-0350
- cpe:2.3:a:pocoproject:poco_c\+\+_libraries:*:p3:*:*:*:*:*:*
- cpe:2.3:a:pocoproject:poco_c\+\+_libraries:1.4.6:p2:*:*:*:*:*:*
- cpe:2.3:a:pocoproject:poco_c\+\+_libraries:1.4.6:p1:*:*:*:*:*:*
- cpe:2.3:a:pocoproject:poco_c\+\+_libraries:1.4.6:-:*:*:*:*:*:*
- cpe:2.3:a:pocoproject:poco_c\+\+_libraries:1.4.5:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-0350
0.08%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 32 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2014-0350
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.4
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:P/A:N |
10.0
|
4.9
|
NIST |
CWE ids for CVE-2014-0350
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-0350
-
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177573.html
[SECURITY] Fedora 23 Update: poco-1.4.2p1-3.fc23
-
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177471.html
[SECURITY] Fedora 22 Update: poco-1.4.2p1-3.fc22
-
https://raw.githubusercontent.com/pocoproject/poco/poco-1.4.6p4-release/CHANGELOG
-
http://www.kb.cert.org/vuls/id/118748
VU#118748 - POCO C++ Libraries NetSSL library fails to properly validate wildcard certificatesUS Government Resource
Jump to