Posted by Lord Tuskington on Oct 19
The exploit is the same as for this issue:
http://mail-archives.apache.org/mod_mbox/www-announce/201408.mbox/CVE-2014-3577
i.e.:
It parsed the entire subject distinguished name (DN)
for the occurrence of any <CN=> substring (regardles of field).
Therefore a DN of with a O field such as
O=”foo,CN=www.apache.orgâ
and a CN of “www.evil.orgâ and ordered such that the O appears prior to
the CN field would…