Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2013-6418

Опубликовано: 05 мая 2014
Источник: debian

Описание

PyWBEM 0.7 and earlier uses a separate connection to validate X.509 certificates, which allows man-in-the-middle attackers to spoof a peer via an arbitrary certificate.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
pywbemfixed0.8.0~dev650-1package
pywbemno-dsasqueezepackage
pywbemno-dsawheezypackage

Примечания

  • fix: https://bugzilla.redhat.com/attachment.cgi?id=851357

Связанные уязвимости

ubuntu
больше 11 лет назад

PyWBEM 0.7 and earlier uses a separate connection to validate X.509 certificates, which allows man-in-the-middle attackers to spoof a peer via an arbitrary certificate.

redhat
около 12 лет назад

PyWBEM 0.7 and earlier uses a separate connection to validate X.509 certificates, which allows man-in-the-middle attackers to spoof a peer via an arbitrary certificate.

nvd
больше 11 лет назад

PyWBEM 0.7 and earlier uses a separate connection to validate X.509 certificates, which allows man-in-the-middle attackers to spoof a peer via an arbitrary certificate.

msrc
5 месяцев назад

PyWBEM 0.7 and earlier uses a separate connection to validate X.509 certificates, which allows man-in-the-middle attackers to spoof a peer via an arbitrary certificate.

CVSS3: 7.5
github
больше 3 лет назад

PyWBEM TOCTOU vulnerability in certificate validation