verify_certificate_identity in the OpenSSL extension in Ruby before 2.0.0 patchlevel 645, 2.1.x before 2.1.6, and 2.2.x before 2.2.2 does not properly validate hostnames, which allows remote attackers to spoof servers via vectors related to (1) multiple wildcards, (1) wildcards in IDNA names, (3) case sensitivity, and (4) non-ASCII characters.
References
Link | Resource |
---|---|
http://www.debian.org/security/2015/dsa-3245 | Third Party Advisory |
http://www.debian.org/security/2015/dsa-3246 | Third Party Advisory |
http://www.debian.org/security/2015/dsa-3247 | Third Party Advisory |
https://bugs.ruby-lang.org/issues/9644 | Third Party Advisory |
https://puppetlabs.com/security/cve/cve-2015-1855 | Third Party Advisory |
https://www.ruby-lang.org/en/news/2015/04/13/ruby-openssl-hostname-matching-vulnerability/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
No history.
Information
Published : 2019-11-29 21:15
Updated : 2024-02-04 20:39
NVD link : CVE-2015-1855
Mitre link : CVE-2015-1855
CVE.ORG link : CVE-2015-1855
JSON object : View
Products Affected
ruby-lang
- trunk
- ruby
debian
- debian_linux
puppet
- puppet_enterprise
- puppet_agent
CWE
CWE-20
Improper Input Validation