Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2013-1090

Опубликовано: 17 июл. 2013
Источник: oracle-oval
Платформа: Oracle Linux 5
Платформа: Oracle Linux 6

Описание

ELSA-2013-1090: ruby security update (MODERATE)

[1.8.7.352-12]

[1.8.7.352-11]

  • hostname check bypassing vulnerability in SSL client.
    • ruby-1.8.7-p374-CVE-2013-4073-fix-hostname-verification.patch
    • Resolves: rhbz#979300

Обновленные пакеты

Oracle Linux 5

Oracle Linux ia64

ruby

1.8.5-31.el5_9

ruby-devel

1.8.5-31.el5_9

ruby-docs

1.8.5-31.el5_9

ruby-irb

1.8.5-31.el5_9

ruby-libs

1.8.5-31.el5_9

ruby-mode

1.8.5-31.el5_9

ruby-rdoc

1.8.5-31.el5_9

ruby-ri

1.8.5-31.el5_9

ruby-tcltk

1.8.5-31.el5_9

Oracle Linux x86_64

ruby

1.8.5-31.el5_9

ruby-devel

1.8.5-31.el5_9

ruby-docs

1.8.5-31.el5_9

ruby-irb

1.8.5-31.el5_9

ruby-libs

1.8.5-31.el5_9

ruby-mode

1.8.5-31.el5_9

ruby-rdoc

1.8.5-31.el5_9

ruby-ri

1.8.5-31.el5_9

ruby-tcltk

1.8.5-31.el5_9

Oracle Linux i386

ruby

1.8.5-31.el5_9

ruby-devel

1.8.5-31.el5_9

ruby-docs

1.8.5-31.el5_9

ruby-irb

1.8.5-31.el5_9

ruby-libs

1.8.5-31.el5_9

ruby-mode

1.8.5-31.el5_9

ruby-rdoc

1.8.5-31.el5_9

ruby-ri

1.8.5-31.el5_9

ruby-tcltk

1.8.5-31.el5_9

Oracle Linux 6

Oracle Linux x86_64

ruby

1.8.7.352-12.el6_4

ruby-devel

1.8.7.352-12.el6_4

ruby-docs

1.8.7.352-12.el6_4

ruby-irb

1.8.7.352-12.el6_4

ruby-libs

1.8.7.352-12.el6_4

ruby-rdoc

1.8.7.352-12.el6_4

ruby-ri

1.8.7.352-12.el6_4

ruby-static

1.8.7.352-12.el6_4

ruby-tcltk

1.8.7.352-12.el6_4

Oracle Linux i686

ruby

1.8.7.352-12.el6_4

ruby-devel

1.8.7.352-12.el6_4

ruby-docs

1.8.7.352-12.el6_4

ruby-irb

1.8.7.352-12.el6_4

ruby-libs

1.8.7.352-12.el6_4

ruby-rdoc

1.8.7.352-12.el6_4

ruby-ri

1.8.7.352-12.el6_4

ruby-static

1.8.7.352-12.el6_4

ruby-tcltk

1.8.7.352-12.el6_4

Связанные CVE

Связанные уязвимости

ubuntu
около 12 лет назад

The OpenSSL::SSL.verify_certificate_identity function in lib/openssl/ssl.rb in Ruby 1.8 before 1.8.7-p374, 1.9 before 1.9.3-p448, and 2.0 before 2.0.0-p247 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.

redhat
около 12 лет назад

The OpenSSL::SSL.verify_certificate_identity function in lib/openssl/ssl.rb in Ruby 1.8 before 1.8.7-p374, 1.9 before 1.9.3-p448, and 2.0 before 2.0.0-p247 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.

nvd
около 12 лет назад

The OpenSSL::SSL.verify_certificate_identity function in lib/openssl/ssl.rb in Ruby 1.8 before 1.8.7-p374, 1.9 before 1.9.3-p448, and 2.0 before 2.0.0-p247 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.

debian
около 12 лет назад

The OpenSSL::SSL.verify_certificate_identity function in lib/openssl/s ...

github
больше 3 лет назад

The OpenSSL::SSL.verify_certificate_identity function in lib/openssl/ssl.rb in Ruby 1.8 before 1.8.7-p374, 1.9 before 1.9.3-p448, and 2.0 before 2.0.0-p247 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.