Vulnerability Description
The int_x509_param_set_hosts function in lib/libcrypto/x509/x509_vpm.c in LibreSSL 2.7.0 before 2.7.1 does not support a certain special case of a zero name length, which causes silent omission of hostname verification, and consequently allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. NOTE: the LibreSSL documentation indicates that this special case is supported, but the BoringSSL documentation does not.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openbsd | Libressl | 2.7.0 |
Related Weaknesses (CWE)
References
- https://boringssl.googlesource.com/boringssl/+/e759a9cd84198613199259dbed401f495Third Party Advisory
- https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-2.7.1-relnotes.txtVendor Advisory
- https://github.com/libressl-portable/openbsd/commit/0654414afcce51a16d35d0506019PatchThird Party Advisory
- https://boringssl.googlesource.com/boringssl/+/e759a9cd84198613199259dbed401f495Third Party Advisory
- https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-2.7.1-relnotes.txtVendor Advisory
- https://github.com/libressl-portable/openbsd/commit/0654414afcce51a16d35d0506019PatchThird Party Advisory
FAQ
What is CVE-2018-8970?
CVE-2018-8970 is a vulnerability with a CVSS score of 7.4 (HIGH). The int_x509_param_set_hosts function in lib/libcrypto/x509/x509_vpm.c in LibreSSL 2.7.0 before 2.7.1 does not support a certain special case of a zero name length, which causes silent omission of hos...
How severe is CVE-2018-8970?
CVE-2018-8970 has been rated HIGH with a CVSS base score of 7.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-8970?
Check the references section above for vendor advisories and patch information. Affected products include: Openbsd Libressl.