First published: Mon Aug 26 2019(Updated: )
An issue was discovered in the openssl crate before 0.9.0 for Rust. There is an SSL/TLS man-in-the-middle vulnerability because certificate verification is off by default and there is no API for hostname verification.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSL | <0.9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-10931 is classified as a high-severity vulnerability due to its potential for man-in-the-middle attacks.
To fix CVE-2016-10931, upgrade the openssl crate to version 0.9.0 or later where the certificate verification is properly enforced.
Using vulnerable versions can allow an attacker to intercept and manipulate SSL/TLS communications without proper validation.
CVE-2016-10931 affects all versions of the openssl crate before 0.9.0.
No, affected versions lack an API for hostname verification, making them more vulnerable to attacks.