First published: Thu Nov 01 2007(Updated: )
A flaw was discovered in a way various ruby net::* modules verify commonName (CN) attribute of SSL certificate provided by server against requested hostname, which makes it easier for remote attackers to intercept SSL transmissions via a man-in-the-middle attack or spoofed site. Issue was originally reported for net::http(s) module and was assigned CVE id <a href="https://access.redhat.com/security/cve/CVE-2007-5162">CVE-2007-5162</a>. However, similar issue also affects other modules: net::ftptls, net::telnets, net::imap and CVS versions of net::pop and net::smtp. Upstream SVN commit: <a href="http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=rev&revision=13656">http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=rev&revision=13656</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ruby-lang Ruby | =1.8.5 | |
Ruby-lang Ruby | =1.8.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.