First published: Sun Aug 22 2021(Updated: )
In GNOME evolution-rss through 0.3.96, network-soup.c does not enable TLS certificate verification on the SoupSessionSync objects it creates, leaving users vulnerable to network MITM attacks. NOTE: this is similar to CVE-2016-20011.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNOME evolution-rss | <=0.3.96 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this GNOME evolution-rss vulnerability is CVE-2021-39361.
The severity of CVE-2021-39361 is medium, with a CVSS score of 5.9.
The affected software for CVE-2021-39361 is GNOME evolution-rss version 0.3.96.
The CWE category for CVE-2021-39361 is CWE-295: Improper Certificate Validation.
To fix the vulnerability in GNOME evolution-rss, it is recommended to update to the latest version available, which includes the necessary TLS certificate verification.