SSL Certificate Validation fix for Man-In-The-Middle problem(WebSphere Application Server Community Edition 3.0.0.x)
There is a patch from the Axis community for SSL Certificate Validation issue(Man-In-The-Middle attack). The issue's CVE number is CVE-2012-5785.
Apache Axis2/Java 1.6.2 and earlier does not verify that the server hostname matches a domain name in the subject's Common Name(CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate
Resolving the problem
To fix this issue, please follow the instruction.
1. Download the patch.SSLCertificateValidation(3.0.0.x).zip
2. Unzip the attached file into the WebSphere Application Server Community Edition installation directory, and ensure the files listed in the zip file to replace the ones in the server installation directory.
3. Start the server with the cache cleaned, for example,
More support for:
WebSphere Application Server Community Edition
Software version: 220.127.116.11, 18.104.22.168, 22.214.171.124
Operating system(s): AIX, Linux, Solaris, Windows
Software edition: Elite, Enhanced, Entry
Reference #: 1618212
Modified date: 19 November 2014
Translate this page: