Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2015-1855


verify_certificate_identity in the OpenSSL extension in Ruby before 2.0.0 patchlevel 645, 2.1.x before 2.1.6, and 2.2.x before 2.2.2 does not properly validate hostnames, which allows remote attackers to spoof servers via vectors related to (1) multiple wildcards, (1) wildcards in IDNA names, (3) case sensitivity, and (4) non-ASCII characters.


Published

2019-11-29T21:15:10.807

Last Modified

2024-11-21T02:26:16.630

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 5.9 (MEDIUM)

CVSSv2 Vector

AV:N/AC:M/Au:N/C:N/I:P/A:N

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: NONE
  • Integrity Impact: PARTIAL
  • Availability Impact: NONE
Exploitability Score

8.6

Impact Score

2.9

Weaknesses
  • Type: Primary
    CWE-20

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application ruby-lang ruby < 2.1.6 Yes
Application ruby-lang ruby < 2.2.2 Yes
Application ruby-lang ruby 2.0.0 Yes
Application ruby-lang ruby 2.0.0 Yes
Application ruby-lang ruby 2.0.0 Yes
Application ruby-lang ruby 2.0.0 Yes
Application ruby-lang ruby 2.0.0 Yes
Application ruby-lang ruby 2.0.0 Yes
Application ruby-lang ruby 2.0.0 Yes
Application ruby-lang ruby 2.0.0 Yes
Application ruby-lang ruby 2.0.0 Yes
Application ruby-lang ruby 2.0.0 Yes
Application ruby-lang ruby 2.0.0 Yes
Application ruby-lang trunk < 50292 Yes
Operating System debian debian_linux 7.0 Yes
Operating System debian debian_linux 8.0 Yes
Operating System debian debian_linux 9.0 Yes
Application puppet puppet_agent 1.0.0 Yes
Application puppet puppet_enterprise < 3.8.0 Yes

References