Hostname Verification Vulnerability in LibreSSL by OpenBSD
CVE-2018-8970

7.4HIGH

Key Information:

Vendor
OpenBSD
Status
Vendor
CVE Published:
24 March 2018

Badges

👾 Exploit Exists🟡 Public PoC

Summary

The int_x509_param_set_hosts function in LibreSSL versions prior to 2.7.1 fails to adequately handle special cases with zero name length, leading to a scenario where hostname verification could be silently omitted. This potential oversight may allow malicious actors to execute man-in-the-middle attacks, whereby they can spoof server identities and intercept sensitive information through crafted certificates. Notably, while the LibreSSL documentation asserts support for this case, the equivalent BoringSSL documentation does not, heightening concerns for users of affected versions.

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
7.4
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.