Cyberduck before 4.4.4 on Windows does not properly validate X.509 certificate chains, which allows man-in-the-middle attackers to spoof FTP-SSL servers via a certificate issued by an arbitrary root Certification Authority.
References
Link Resource
http://secunia.com/advisories/58426 Issue Tracking Permissions Required
http://www.securityfocus.com/archive/1/532039/100/0/threaded Exploit Third Party Advisory VDB Entry
https://cyberduck.io/changelog/ Issue Tracking Release Notes Vendor Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2017-11-15T18:00:00

Updated: 2018-10-09T18:57:01

Reserved: 2014-04-10T00:00:00


Link: CVE-2014-2845

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2017-11-15T18:29:00.280

Modified: 2019-12-11T15:20:15.057


Link: CVE-2014-2845

JSON object: View

cve-icon Redhat Information

No data.

CWE