CVE-2010-1192Libesmtp vulnerability

8 documents7 sources
Severity
6.8MEDIUMNVD
OSV5.9
EPSS
0.2%
top 53.45%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 31
Latest updateMay 2

Description

libESMTP, probably 1.0.4 and earlier, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.

CVSS vector

AV:N/AC:M/C:P/I:P/A:PExploitability: 8.6 | Impact: 6.4

Affected Packages3 packages

debiandebian/libesmtp< libesmtp 1.0.4-5 (bookworm)
Debianlibesmtp/libesmtp< 1.0.4-5+3

🔴Vulnerability Details

2
GHSA
GHSA-g2h9-5v79-gp76: libESMTP, probably 12022-05-02
OSV
CVE-2010-1192: libESMTP, probably 12010-03-31

💥Exploits & PoCs

1
Exploit-DB
IA WebMail Server 3.x - Remote Buffer Overflow (Metasploit)2010-05-09

📋Vendor Advisories

2
Red Hat
libESMTP: Multiple certificate validation flaws2010-03-03
Debian
CVE-2010-1192: libesmtp - libESMTP, probably 1.0.4 and earlier, does not properly handle a '\0' character ...2010

💬Community

2
Bugzilla
CVE-2010-1192 CVE-2010-1194 libESMTP: Multiple certificate validation flaws [epel-5]2014-06-30
Bugzilla
CVE-2010-1192 CVE-2010-1194 libESMTP: Multiple certificate validation flaws2010-03-09