Description: | Jakarta Commons HTTPClient implements the client side of HTTP standards.It was discovered that the HTTPClient incorrectly extracted host name froman X.509 certificate subject's Common Name (CN) field. A man-in-the-middleattacker could use this flaw to spoof an SSL server using a speciallycrafted X.509 certificate. (CVE-2014-3577)For additional information on this flaw, refer to the Knowledgebasearticle in the References section.All jakarta-commons-httpclient users are advised to upgrade to theseupdated packages, which contain a backported patch to correct this issue. |