Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2013-6418

Опубликовано: 05 мая 2014
Источник: debian
EPSS Низкий

Описание

PyWBEM 0.7 and earlier uses a separate connection to validate X.509 certificates, which allows man-in-the-middle attackers to spoof a peer via an arbitrary certificate.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
pywbemfixed0.8.0~dev650-1package
pywbemno-dsasqueezepackage
pywbemno-dsawheezypackage

Примечания

  • fix: https://bugzilla.redhat.com/attachment.cgi?id=851357

EPSS

Процентиль: 57%
0.00345
Низкий

Связанные уязвимости

ubuntu
почти 12 лет назад

PyWBEM 0.7 and earlier uses a separate connection to validate X.509 certificates, which allows man-in-the-middle attackers to spoof a peer via an arbitrary certificate.

redhat
больше 12 лет назад

PyWBEM 0.7 and earlier uses a separate connection to validate X.509 certificates, which allows man-in-the-middle attackers to spoof a peer via an arbitrary certificate.

nvd
почти 12 лет назад

PyWBEM 0.7 and earlier uses a separate connection to validate X.509 certificates, which allows man-in-the-middle attackers to spoof a peer via an arbitrary certificate.

msrc
7 месяцев назад

PyWBEM 0.7 and earlier uses a separate connection to validate X.509 certificates, which allows man-in-the-middle attackers to spoof a peer via an arbitrary certificate.

CVSS3: 7.5
github
почти 4 года назад

PyWBEM TOCTOU vulnerability in certificate validation

EPSS

Процентиль: 57%
0.00345
Низкий