CPANSA-IO-Socket-SSL-2009-3024: IO-Socket-SSL vulnerability
Publisher |
giterlizzi |
Document category |
csaf_security_advisory |
Initial release date |
2009-08-31T00:00:00 |
Engine |
CSAF Perl Toolkit 0.25 |
Current release date |
2009-08-31T00:00:00 |
Build Date |
|
Current version |
1 |
Status |
final |
CVSS v3.1 Base Score |
|
Severity |
|
Original language |
|
Language |
en |
Also referred to |
|
Vulnerability Description
The verify_hostname_of_cert function in the certificate checking feature in IO-Socket-SSL (IO::Socket::SSL) 1.14 through 1.25 only matches the prefix of a hostname when no wildcard is used, which allows remote attackers to bypass the hostname check for a certificate.
Vulnerabilities
CVE-2009-3024
Vulnerability DescriptionThe verify_hostname_of_cert function in the certificate checking feature in IO-Socket-SSL (IO::Socket::SSL) 1.14 through 1.25 only matches the prefix of a hostname when no wildcard is used, which allows remote attackers to bypass the hostname check for a certificate.
Weakness |
CWE-310 : Cryptographic Issues
|
Product status
Known affected
Product |
Score |
IO-Socket-SSL greater than or equal 1.14 |
CVSS Version |
CVSS Vector |
CVSS Base Score |
CVSS Base Severity |
2.0 |
AV:N/AC:M/Au:N/C:N/I:P/A:N
|
4.3
|
Medium
|
|
IO-Socket-SSL less than or equal 1.25 |
CVSS Version |
CVSS Vector |
CVSS Base Score |
CVSS Base Severity |
2.0 |
AV:N/AC:M/Au:N/C:N/I:P/A:N
|
4.3
|
Medium
|
|
Fixed
- IO-Socket-SSL greater than or equal 1.26
giterlizzi
Namespace: https://github.com/giterlizzi/
gdt@cpan.org
References
Revision history
Version |
Date of the revision |
Summary of the revision |
1 |
Mon Aug 31 00:00:00 2009 |
First release |
Sharing rules
TLP:WHITE
For the TLP version see: https://www.first.org/tlp/