OpenConnect before 2.25 does not properly validate X.509 certificates, which allows man-in-the-middle attackers to spoof arbitrary AnyConnect SSL VPN servers via a crafted server certificate that (1) does not correspond to the server hostname or (2) is presented in circumstances involving a missing --cafile configuration option.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://www.infradead.org/openconnect.html | |
http://www.openwall.com/lists/oss-security/2010/08/01/1 | mailing list |
http://www.openwall.com/lists/oss-security/2010/08/02/7 | mailing list |