CVE-2010-0744
Severity CVSS v4.0:
Pending analysis
Type:
CWE-287
Authentication Issues
Publication date:
20/04/2010
Last modified:
11/04/2025
Description
aMSN (aka Alvaro's Messenger) 0.98.3 and earlier, when SSL is used, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) field or a Subject Alternative Name field of the X.509 certificate, which allows man-in-the-middle attackers to spoof an MSN server via an arbitrary certificate.
Impact
Base Score 2.0
5.80
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:alvaro:alvaros_messenger:*:*:*:*:*:*:*:* | 0.98.3 (including) | |
| cpe:2.3:a:alvaro:alvaros_messenger:0.83:*:*:*:*:*:*:* | ||
| cpe:2.3:a:alvaro:alvaros_messenger:0.90:*:*:*:*:*:*:* | ||
| cpe:2.3:a:alvaro:alvaros_messenger:0.91:*:*:*:*:*:*:* | ||
| cpe:2.3:a:alvaro:alvaros_messenger:0.92:*:*:*:*:*:*:* | ||
| cpe:2.3:a:alvaro:alvaros_messenger:0.93:*:*:*:*:*:*:* | ||
| cpe:2.3:a:alvaro:alvaros_messenger:0.94:*:*:*:*:*:*:* | ||
| cpe:2.3:a:alvaro:alvaros_messenger:0.95:*:*:*:*:*:*:* | ||
| cpe:2.3:a:alvaro:alvaros_messenger:0.96:*:*:*:*:*:*:* | ||
| cpe:2.3:a:alvaro:alvaros_messenger:0.97:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://amsn.svn.sourceforge.net/viewvc/amsn/trunk/?view=log&pathrev=11991
- http://amsn.svn.sourceforge.net/viewvc/amsn/trunk/amsn/proxy.tcl?r1=11886&r2=11991&pathrev=11991
- http://amsn.svn.sourceforge.net/viewvc/amsn/trunk/amsn/sip.tcl?r1=11953&r2=11991&pathrev=11991
- http://amsn.svn.sourceforge.net/viewvc/amsn/trunk/amsn/soap.tcl?r1=11891&r2=11991&pathrev=11991
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=572818
- http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041046.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041079.html
- http://seclists.org/bugtraq/2009/Jun/239
- http://secunia.com/advisories/35621
- http://secunia.com/advisories/39796
- http://www.opensource-archive.org/showthread.php?p=183821
- http://www.openwall.com/lists/oss-security/2010/03/10/4
- http://www.openwall.com/lists/oss-security/2010/04/01/4
- http://www.securityfocus.com/bid/35507
- http://www.vupen.com/english/advisories/2010/1109
- http://amsn.svn.sourceforge.net/viewvc/amsn/trunk/?view=log&pathrev=11991
- http://amsn.svn.sourceforge.net/viewvc/amsn/trunk/amsn/proxy.tcl?r1=11886&r2=11991&pathrev=11991
- http://amsn.svn.sourceforge.net/viewvc/amsn/trunk/amsn/sip.tcl?r1=11953&r2=11991&pathrev=11991
- http://amsn.svn.sourceforge.net/viewvc/amsn/trunk/amsn/soap.tcl?r1=11891&r2=11991&pathrev=11991
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=572818
- http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041046.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041079.html
- http://seclists.org/bugtraq/2009/Jun/239
- http://secunia.com/advisories/35621
- http://secunia.com/advisories/39796
- http://www.opensource-archive.org/showthread.php?p=183821
- http://www.openwall.com/lists/oss-security/2010/03/10/4
- http://www.openwall.com/lists/oss-security/2010/04/01/4
- http://www.securityfocus.com/bid/35507
- http://www.vupen.com/english/advisories/2010/1109



