The sslverifyserver_cert function in sql-common/client.c in MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10; Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier; and Percona Server do not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a "/CN=" string in a field in a certificate, as demonstrated by "/OU=/CN=bar.com/CN=foo.com."
[
{
"signature_type": "Line",
"source": "https://github.com/mariadb/server/commit/90ea0145856338221803ebb9b446ed2a6e082412",
"target": {
"file": "sql/init.cc"
},
"id": "CVE-2016-2047-418dc194",
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"147107641273993383240782259862025438176",
"92010967798498701673315862426094756400",
"327751778421770712387529959218426352739",
"335366999246722941831157885595185343881",
"273999841737195452499309953200498666375",
"210517212316227742052728977697524822713"
]
},
"deprecated": false
},
{
"signature_type": "Line",
"source": "https://github.com/mariadb/server/commit/90ea0145856338221803ebb9b446ed2a6e082412",
"target": {
"file": "mysys/my_static.c"
},
"id": "CVE-2016-2047-66b1a29e",
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"24307595873147278150201970310353889821",
"48675940072839761549793864817188524169",
"216230675055673289190865619159493735368",
"20652123376710344335504722831294169387"
]
},
"deprecated": false
},
{
"signature_type": "Function",
"source": "https://github.com/mariadb/server/commit/90ea0145856338221803ebb9b446ed2a6e082412",
"target": {
"file": "sql/init.cc",
"function": "unireg_init"
},
"id": "CVE-2016-2047-a534a020",
"signature_version": "v1",
"digest": {
"function_hash": "311144189938665340085863602879392151383",
"length": 449.0
},
"deprecated": false
},
{
"signature_type": "Line",
"source": "https://github.com/mariadb/server/commit/90ea0145856338221803ebb9b446ed2a6e082412",
"target": {
"file": "plugin/daemon_example/daemon_example.cc"
},
"id": "CVE-2016-2047-cd5bea7a",
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"167000630030318618717608062140112220235",
"10642358439317725583287537405604680149",
"162374108280077942150750980263312138467",
"50163437060249974045566719846816540694"
]
},
"deprecated": false
},
{
"signature_type": "Line",
"source": "https://github.com/mariadb/server/commit/90ea0145856338221803ebb9b446ed2a6e082412",
"target": {
"file": "include/my_sys.h"
},
"id": "CVE-2016-2047-dd6f816d",
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"80280507170444425678090689408551056030",
"186901013121802111627367647389618571691",
"35090662641952932041522151791618716843",
"119536087546367306015463964300481495175",
"36459839600648900298056848002263452468"
]
},
"deprecated": false
}
]
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-2047.json"