The C client and C-based client bindings in the Apache Qpid Proton library before 0.13.1 on Windows do not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate when using the SChannel-based security layer, which allows man-in-the-middle attackers to spoof servers via an arbitrary valid certificate.
2017-05-02T14:59:00.377
2025-04-20T01:37:25.860
Deferred
CVSSv3.0: 5.9 (MEDIUM)
AV:N/AC:M/Au:N/C:N/I:P/A:N
8.6
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | apache | qpid_proton | 0.8.0 | Yes |
Application | apache | qpid_proton | 0.9.0 | Yes |
Application | apache | qpid_proton | 0.9.1 | Yes |
Application | apache | qpid_proton | 0.10.0 | Yes |
Application | apache | qpid_proton | 0.11.0 | Yes |
Application | apache | qpid_proton | 0.11.1 | Yes |
Application | apache | qpid_proton | 0.12.0 | Yes |
Application | apache | qpid_proton | 0.12.1 | Yes |
Application | apache | qpid_proton | 0.12.2 | Yes |
Application | apache | qpid_proton | 0.13.0 | Yes |