Release Date: | 2015-11-30 |
The ssl_verify_server_cert function in sql-common/client.c in MariaDBbefore 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10, Oracle MySQL, and Percona Server do not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a /CN= string in a field in a certificate, as demonstrated by /OU=/CN=bar.com/CN=foo.com.
See more information about CVE-2016-2047 from MITRE CVE dictionary and NIST NVD
NOTE: The following CVSS v2.0 metrics and score provided are preliminary and subject to review.
Base Score: | 4.9 | Base Metrics: | AV:N/AC:M/Au:S/C:P/I:P/A:N |
Access Vector: | Network | Attack Complexity: | Medium |
Authentication: | Requires single instance | Confidentiality Impact: | Partial |
Integrity Impact: | Partial | Availability Impact: | None |
Platform | Errata | Release Date |
Oracle Linux version 7 (mariadb) | ELSA-2016-0534 | 2016-03-31 |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team