First published: Mon Sep 29 2014(Updated: )
The urlopen function in pym/portage/util/_urlopen.py in Gentoo Portage 2.1.12, when using HTTPS, does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and modify binary package lists via a crafted certificate.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Gentoo Portage | =2.1.12 | |
pip/portage | <2.1.12.2 | 2.1.12.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-2100 is classified as a high severity vulnerability due to the potential for man-in-the-middle attacks.
To fix CVE-2013-2100, upgrade to a patched version of Portage, specifically version 2.1.12.2 or later.
CVE-2013-2100 affects Gentoo Portage version 2.1.12 when using HTTPS connections.
CVE-2013-2100 allows man-in-the-middle attackers to spoof servers and alter binary package lists.
The vulnerability in CVE-2013-2100 is found in the urlopen function of pym/portage/util/_urlopen.py.