Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-2674

Опубликовано: 09 авг. 2017
Источник: debian

Описание

Restkit allows man-in-the-middle attackers to spoof TLS servers by leveraging use of the ssl.wrap_socket function in Python with the default CERT_NONE value for the cert_reqs argument.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
python-restkitremovedpackage
python-restkitignoredstretchpackage
python-restkitignoredjessiepackage
python-restkitignoredwheezypackage
python-restkitno-dsasqueezepackage

Примечания

  • https://github.com/benoitc/restkit/issues/140

  • https://www.openwall.com/lists/oss-security/2015/03/12/9

Связанные уязвимости

CVSS3: 5.9
ubuntu
больше 8 лет назад

Restkit allows man-in-the-middle attackers to spoof TLS servers by leveraging use of the ssl.wrap_socket function in Python with the default CERT_NONE value for the cert_reqs argument.

CVSS3: 5.9
nvd
больше 8 лет назад

Restkit allows man-in-the-middle attackers to spoof TLS servers by leveraging use of the ssl.wrap_socket function in Python with the default CERT_NONE value for the cert_reqs argument.

CVSS3: 5.9
github
больше 3 лет назад

Restkit Does Not Validate TLS certificates