CVE-2011-1428
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
16/03/2011
Last modified:
11/04/2025
Description
Wee Enhanced Environment for Chat (aka WeeChat) 0.3.4 and earlier does not properly verify that the server hostname matches the domain name of the subject of an X.509 certificate, which allows man-in-the-middle attackers to spoof an SSL chat server via an arbitrary certificate, related to incorrect use of the GnuTLS API.
Impact
Base Score 2.0
5.80
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:flashtux:weechat:*:*:*:*:*:*:*:* | 0.3.4 (including) | |
| cpe:2.3:a:flashtux:weechat:0.0.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:flashtux:weechat:0.0.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:flashtux:weechat:0.0.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:flashtux:weechat:0.0.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:flashtux:weechat:0.0.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:flashtux:weechat:0.0.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:flashtux:weechat:0.0.7:*:*:*:*:*:*:* | ||
| cpe:2.3:a:flashtux:weechat:0.0.8:*:*:*:*:*:*:* | ||
| cpe:2.3:a:flashtux:weechat:0.0.9:*:*:*:*:*:*:* | ||
| cpe:2.3:a:flashtux:weechat:0.1.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:flashtux:weechat:0.1.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:flashtux:weechat:0.1.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:flashtux:weechat:0.1.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:flashtux:weechat:0.1.4:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://archives.neohapsis.com/archives/fulldisclosure/2011-02/0671.html
- http://git.savannah.gnu.org/gitweb/?p=weechat.git%3Ba%3Dcommit%3Bh%3Dc265cad1c95b84abfd4e8d861f25926ef13b5d91
- http://savannah.nongnu.org/patch/index.php?7459=
- http://secunia.com/advisories/43543
- http://www.securityfocus.com/bid/46612
- http://archives.neohapsis.com/archives/fulldisclosure/2011-02/0671.html
- http://git.savannah.gnu.org/gitweb/?p=weechat.git%3Ba%3Dcommit%3Bh%3Dc265cad1c95b84abfd4e8d861f25926ef13b5d91
- http://savannah.nongnu.org/patch/index.php?7459=
- http://secunia.com/advisories/43543
- http://www.securityfocus.com/bid/46612



