Bug 362081 (CVE-2007-5770) - CVE-2007-5770 ruby insufficient verification of SSL certificate in various net::* modules
Summary: CVE-2007-5770 ruby insufficient verification of SSL certificate in various ne...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2007-5770
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 320331 320341 320371 320381 373371 373381 373391 373401
Blocks:
TreeView+ depends on / blocked
 
Reported: 2007-11-01 16:36 UTC by Tomas Hoger
Modified: 2019-09-29 12:22 UTC (History)
2 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2008-01-16 16:50:43 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2007:0961 0 normal SHIPPED_LIVE Moderate: ruby security update 2007-11-13 09:58:07 UTC
Red Hat Product Errata RHSA-2007:0965 0 normal SHIPPED_LIVE Moderate: ruby security update 2007-11-13 09:39:26 UTC

Description Tomas Hoger 2007-11-01 16:36:35 UTC
A flaw was discovered in a way various ruby net::* modules verify commonName
(CN) attribute of SSL certificate provided by server against requested hostname,
which makes it easier for remote attackers to intercept SSL transmissions via a
man-in-the-middle attack or spoofed site.

Issue was originally reported for net::http(s) module and was assigned CVE id
CVE-2007-5162.  However, similar issue also affects other modules: net::ftptls,
net::telnets, net::imap and CVS versions of net::pop and net::smtp.

Upstream SVN commit:
http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=rev&revision=13656


Note You need to log in before you can comment on or make changes to this bug.