VYPR
Moderate severityNVD Advisory· Published Aug 27, 2014· Updated May 6, 2026

CVE-2014-3596

CVE-2014-3596

Description

The getCN function in Apache Axis 1.4 and earlier does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a certificate with a subject that specifies a common name in a field that is not the CN field. NOTE: this issue exists because of an incomplete fix for CVE-2012-5784.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.apache.axis:axisMaven
<= 1.4
axis:axisMaven
<= 1.4

Affected products

19
  • Apache/Axis19 versions
    cpe:2.3:a:apache:axis:*:*:*:*:*:*:*:*+ 18 more
    • cpe:2.3:a:apache:axis:*:*:*:*:*:*:*:*range: <=1.4
    • cpe:2.3:a:apache:axis:1.0:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:axis:1.0:beta:*:*:*:*:*:*
    • cpe:2.3:a:apache:axis:1.0:rc1:*:*:*:*:*:*
    • cpe:2.3:a:apache:axis:1.0:rc2:*:*:*:*:*:*
    • cpe:2.3:a:apache:axis:1.1:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:axis:1.1:beta:*:*:*:*:*:*
    • cpe:2.3:a:apache:axis:1.1:rc1:*:*:*:*:*:*
    • cpe:2.3:a:apache:axis:1.1:rc2:*:*:*:*:*:*
    • cpe:2.3:a:apache:axis:1.2:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:axis:1.2.1:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:axis:1.2:alpha:*:*:*:*:*:*
    • cpe:2.3:a:apache:axis:1.2:beta1:*:*:*:*:*:*
    • cpe:2.3:a:apache:axis:1.2:beta2:*:*:*:*:*:*
    • cpe:2.3:a:apache:axis:1.2:beta3:*:*:*:*:*:*
    • cpe:2.3:a:apache:axis:1.2:rc1:*:*:*:*:*:*
    • cpe:2.3:a:apache:axis:1.2:rc2:*:*:*:*:*:*
    • cpe:2.3:a:apache:axis:1.2:rc3:*:*:*:*:*:*
    • cpe:2.3:a:apache:axis:1.3:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

29

News mentions

0

No linked articles in our index yet.