Symantec DV Certificate Issuance System Improperly Handled Domain Email Address Special Characters
1345
05 March 2020
04 February 2016
CLOSED
MEDIUM
5.8
SUMMARY
Symantec domain-validated (DV) SSL/TLS certificate issuance system, e.g. RapidSSL, QuickSSL, did not properly handle special characters in an email address when verifying a domain owner through email addresses found in WHOIS records. This could have potentially resulted in the issuance of a DV certificate for possible fraudulent use.
AFFECTED PRODUCTS
Symantec Domain Validation Certificates |
||
CVE |
Affected Version(s) |
Remediation |
CVE-2015-6553 |
All |
Addressed in Current Service Offering |
ISSUES
CVE-2015-6553 |
|
Severity/CVSSv3: |
Medium / 5.8 AV:N/AC:M/Au:N/C:P/I:P/A:N |
References: Impact: |
Securityfocus: BID 80378 / NVD: CVE-2015-6553 Symantec DV Certificate Issuance System Improperly Handled Domain Email Address Special Characters |
Description: |
DV certificates require the lowest level of authentication to validate a SSL/TLS certificate order. Certificate Authorities (CAs) issue DV certificates through a Whois record lookup and an approval email is subsequently sent to the registrant email address found in that record. Symantec DV SSL/TLS certificate issuance system did not properly handle special characters that are allowed, but are not commonly used, in email addresses found in whois records. This could have potentially allowed an individual to use an otherwise legitimate domain name to fraudulently obtain a valid DV SSL/TLS certificate. Such a valid DV certificate could have potentially been used to provide authentication to an otherwise malicious phishing site for example. |
MITIGATION
Symantec Response
Symantec engineers verified this issue and resolved it in the Symantec DV SSL/TLS certificate issuance system. No customer upgrade is required. Existing customer SSL/TLS certificates have been re-validated. Symantec is not aware of exploitation of or adverse impact from this finding.
ACKNOWLEDGEMENTS
Symantec would like to thank Andrew Ayer of SSLMate, https://www.agwa.name/, for reporting this issue and coordinating with us as we worked through it.