Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux

CVE-2010-0744
CVE information
Published
Last Modified
CVSSv2.0 Severity
Impact Analysis
Description
aMSN (aka Alvaro's Messenger) 0.98.3 and earlier, when SSL is used, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) field or a Subject Alternative Name field of the X.509 certificate, which allows man-in-the-middle attackers to spoof an MSN server via an arbitrary certificate..
CVSSv2.0 Score
- Severity
- Medium
- Base Score
- 5.8/10
- Exploit Score
- 8.6/10
- Access Vector
- Network
- Access Complexity
- Medium
- Authentication Required
- None
- Impact Score
- 4.9/10
- Confidentiality Impact
- Partial
- Availability Impact
- None
- Integrity Impact
- Partial
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:a:alvaro:alvaros_messenger:0.83:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:alvaro:alvaros_messenger:0.97:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:alvaro:alvaros_messenger:0.93:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:alvaro:alvaros_messenger:0.95:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:alvaro:alvaros_messenger:0.91:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:alvaro:alvaros_messenger:0.94:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:alvaro:alvaros_messenger:0.96:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:alvaro:alvaros_messenger:*:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:alvaro:alvaros_messenger:0.92:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:alvaro:alvaros_messenger:0.90:*:*:*:*:*:*:* |
Yes
|
- | - |
References
- http://amsn.svn.sourceforge.net/viewvc/amsn/trunk/?view=log&pathrev=11991
- http://amsn.svn.sourceforge.net/viewvc/amsn/trunk/amsn/soap.tcl?r1=11891&r2=11991&pathre
- http://amsn.svn.sourceforge.net/viewvc/amsn/trunk/amsn/sip.tcl?r1=11953&r2=11991&pathrev
- http://www.openwall.com/lists/oss-security/2010/04/01/4
- http://secunia.com/advisories/35621
- http://seclists.org/bugtraq/2009/Jun/239
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=572818
- http://amsn.svn.sourceforge.net/viewvc/amsn/trunk/amsn/proxy.tcl?r1=11886&r2=11991&pathr
- http://www.opensource-archive.org/showthread.php?p=183821
- http://www.openwall.com/lists/oss-security/2010/03/10/4
- http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041046.html
- http://www.vupen.com/english/advisories/2010/1109
- http://secunia.com/advisories/39796
- http://www.securityfocus.com/bid/35507
- http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041079.html