Vulnerability Details : CVE-2014-3504
The (1) serf_ssl_cert_issuer, (2) serf_ssl_cert_subject, and (3) serf_ssl_cert_certificate functions in Serf 0.2.0 through 1.3.x before 1.3.7 does not properly handle a NUL byte in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.
Products affected by CVE-2014-3504
- cpe:2.3:a:apache:subversion:1.6.5:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.6.4:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.6.12:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.6.11:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.6.3:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.6.7:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.6.6:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.6.10:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.6.9:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.6.8:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.5.6:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.5.5:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.5.4:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.5.3:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.5.7:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.4.4:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.4.3:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.4.6:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.4.5:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.5.8:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.6.13:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.6.14:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.6.15:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.6.16:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.6.19:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.6.20:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.6.18:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.6.17:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.7.2:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.7.3:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.7.6:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.7.7:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.7.0:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.7.1:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.7.8:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.7.4:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.7.5:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.7.9:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.8.0:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.8.1:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.8.2:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.6.21:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.7.10:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.6.23:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.7.12:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.7.11:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.8.3:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.8.4:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.7.13:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.8.5:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.7.17:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.8.7:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.8.6:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.7.14:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.8.8:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.8.9:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.7.16:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.7.15:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
- cpe:2.3:a:serf_project:serf:0.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:serf_project:serf:0.7.0:*:*:*:*:*:*:*
- cpe:2.3:a:serf_project:serf:1.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:serf_project:serf:1.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:serf_project:serf:1.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:serf_project:serf:1.3.5:*:*:*:*:*:*:*
- cpe:2.3:a:serf_project:serf:0.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:serf_project:serf:0.7.1:*:*:*:*:*:*:*
- cpe:2.3:a:serf_project:serf:0.7.2:*:*:*:*:*:*:*
- cpe:2.3:a:serf_project:serf:1.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:serf_project:serf:1.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:serf_project:serf:1.3.6:*:*:*:*:*:*:*
- cpe:2.3:a:serf_project:serf:0.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:serf_project:serf:0.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:serf_project:serf:0.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:serf_project:serf:1.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:serf_project:serf:1.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:serf_project:serf:1.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:serf_project:serf:1.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:serf_project:serf:0.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:serf_project:serf:0.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:serf_project:serf:1.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:serf_project:serf:1.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:serf_project:serf:1.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:serf_project:serf:1.3.1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-3504
0.10%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 43 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2014-3504
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.0
|
MEDIUM | AV:N/AC:H/Au:N/C:P/I:P/A:N |
4.9
|
4.9
|
NIST |
References for CVE-2014-3504
-
https://groups.google.com/forum/#!topic/serf-dev/NvgPoK6sFsc
Serf Security Advisory for CVE-2014-3504: SSL Certificate Null Byte Poisoning - Google Groepen
-
http://www.securityfocus.com/bid/69238
Serf CVE-2014-3504 SSL Certificate Validation Information Disclosure Vulnerability
-
http://secunia.com/advisories/59584
Sign in
-
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
Oracle Solaris Third Party Bulletin - October 2015
-
https://subversion.apache.org/security/CVE-2014-3522-advisory.txt
Vendor Advisory
-
https://security.gentoo.org/glsa/201610-05
Subversion, Serf: Multiple Vulnerabilities (GLSA 201610-05) — Gentoo security
-
http://secunia.com/advisories/60721
Sign in
-
http://lists.opensuse.org/opensuse-updates/2014-08/msg00038.html
openSUSE-SU-2014:1059-1: moderate: update for libserf, subversion
-
http://ubuntu.com/usn/usn-2315-1
USN-2315-1: serf vulnerability | Ubuntu security noticesVendor Advisory
Jump to