• M
    Reject certificates with embedded NULLs in the commonName field. This stops · d7242375
    Magnus Hagander 提交于
    attacks where an attacker would put <attack>\0<propername> in the field and
    trick the validation code that the certificate was for <attack>.
    
    This is a very low risk attack since it reuqires the attacker to trick the
    CA into issuing a certificate with an incorrect field, and the common
    PostgreSQL deployments are with private CAs, and not external ones. Also,
    default mode in 8.4 does not do any name validation, and is thus also not
    vulnerable - but the higher security modes are.
    
    Backpatch all the way. Even though versions 8.3.x and before didn't have
    certificate name validation support, they still exposed this field for
    the user to perform the validation in the application code, and there
    is no way to detect this problem through that API.
    
    Security: CVE-2009-4034
    d7242375
be-secure.c 26.0 KB