SSL Certificate Validation fix for Man-In-The-Middle problem(WebSphere Application Server Community Edition 3.0.0.x)

Technote (troubleshooting)


Problem(Abstract)

There is a patch from the Axis community for SSL Certificate Validation issue(Man-In-The-Middle attack). The issue's CVE number is CVE-2012-5785.

Symptom

Apache Axis2/Java 1.6.2 and earlier does not verify that the server hostname matches a domain name in the subject's Common Name(CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate


Resolving the problem

To fix this issue, please follow the instruction.

1. Download the patch.SSLCertificateValidation(3.0.0.x).zipSSLCertificateValidation(3.0.0.x).zip

2. Unzip the attached file into the WebSphere Application Server Community Edition installation directory, and ensure the files listed in the zip file to replace the ones in the server installation directory.

3. Start the server with the cache cleaned, for example,

<WAS_CE_HOME>\bin\startup.bat -c

<WAS_CE_HOME>/bin/startup.sh -c

Rate this page:

(0 users)Average rating

Document information


More support for:

WebSphere Application Server Community Edition
AxisWebServices

Software version:

3.0.0.0, 3.0.0.1, 3.0.0.2

Operating system(s):

AIX, Linux, Solaris, Windows

Software edition:

Elite, Enhanced, Entry

Reference #:

1618212

Modified date:

2014-11-19

Translate my page

Machine Translation

Content navigation