The sslverifyserver_cert function in sql-common/client.c in MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10; Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier; and Percona Server do not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a "/CN=" string in a field in a certificate, as demonstrated by "/OU=/CN=bar.com/CN=foo.com."
[
{
"deprecated": false,
"source": "https://github.com/mariadb/server/commit/89a264809d660fb5a4e7d43e9324b1f529a3a1d7",
"id": "CVE-2016-2047-a5ddc231",
"target": {
"file": "sql/sql_reload.cc",
"function": "reload_acl_and_cache"
},
"digest": {
"function_hash": "111043706433505470027673465066186674885",
"length": 5996.0
},
"signature_type": "Function",
"signature_version": "v1"
},
{
"deprecated": false,
"source": "https://github.com/mariadb/server/commit/89a264809d660fb5a4e7d43e9324b1f529a3a1d7",
"id": "CVE-2016-2047-ac002921",
"target": {
"file": "sql/sql_reload.cc"
},
"digest": {
"line_hashes": [
"159306742910402693391330092690036756588",
"154471466612685282770028951812159094962",
"48625389135732133100007130350636776985",
"293342893800983215307900708602667742465"
],
"threshold": 0.9
},
"signature_type": "Line",
"signature_version": "v1"
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-2047.json"