Cisco Blog >Threat Research

Threat Research

This vulnerability was discovered by Aleksandar Nikolic of Cisco Talos.

Talos has discovered a vulnerability in the Randombit Botan library. A programming error exists in a way Botan library implements x500 string comparisons which could lead to certificate verification issues and abuse. A specially crafted X509 certificate would need to be delivered to the client or server application in order to trigger this vulnerability. A security advisory was published on the Randombit website to inform users the vulnerability is now fixed in versions 2.1.0 and 1.10.16.

Read More »

Cisco Systems Inc. published this content on 28 April 2017 and is solely responsible for the information contained herein.
Distributed by Public, unedited and unaltered, on 28 April 2017 14:59:09 UTC.

Original documenthttps://blogs.cisco.com/security/talos/vulnerability-spotlight-randombit-botan-library-x509-certificate-validation-bypass-vulnerability

Public permalinkhttp://www.publicnow.com/view/93281654400DED59B8540A09CE89ECAAAD0B592E