Cyberduck before 4.4.4 on Windows does not properly validate X.509 certificate chains, which allows man-in-the-middle attackers to spoof FTP-SSL servers via a certificate issued by an arbitrary root Certification Authority.
References
Link | Resource |
---|---|
http://secunia.com/advisories/58426 | Issue Tracking Permissions Required |
http://www.securityfocus.com/archive/1/532039/100/0/threaded | Exploit Third Party Advisory VDB Entry |
https://cyberduck.io/changelog/ | Issue Tracking Release Notes Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2017-11-15T18:00:00
Updated: 2018-10-09T18:57:01
Reserved: 2014-04-10T00:00:00
Link: CVE-2014-2845
JSON object: View
NVD Information
Status : Analyzed
Published: 2017-11-15T18:29:00.280
Modified: 2019-12-11T15:20:15.057
Link: CVE-2014-2845
JSON object: View
Redhat Information
No data.
CWE