Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2014-3230

Опубликовано: 01 мая 2014
Источник: redhat
CVSS2: 5.8

Описание

The libwww-perl LWP::Protocol::https module 6.04 through 6.06 for Perl, when using IO::Socket::SSL as the SSL socket class, allows attackers to disable server certificate validation via the (1) HTTPS_CA_DIR or (2) HTTPS_CA_FILE environment variable.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5perl-libwww-perlNot affected
Red Hat Enterprise Linux 6perl-libwww-perlNot affected
Red Hat Enterprise Linux 7perl-libwww-perlWill not fix

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-295
https://bugzilla.redhat.com/show_bug.cgi?id=1094440perl-libwww-perl: incorrect handling of SSL certificate verification

5.8 Medium

CVSS2

Связанные уязвимости

CVSS3: 5.9
ubuntu
около 6 лет назад

The libwww-perl LWP::Protocol::https module 6.04 through 6.06 for Perl, when using IO::Socket::SSL as the SSL socket class, allows attackers to disable server certificate validation via the (1) HTTPS_CA_DIR or (2) HTTPS_CA_FILE environment variable.

CVSS3: 5.9
nvd
около 6 лет назад

The libwww-perl LWP::Protocol::https module 6.04 through 6.06 for Perl, when using IO::Socket::SSL as the SSL socket class, allows attackers to disable server certificate validation via the (1) HTTPS_CA_DIR or (2) HTTPS_CA_FILE environment variable.

CVSS3: 5.9
debian
около 6 лет назад

The libwww-perl LWP::Protocol::https module 6.04 through 6.06 for Perl ...

github
больше 3 лет назад

The libwww-perl LWP::Protocol::https module 6.04 through 6.06 for Perl, when using IO::Socket::SSL as the SSL socket class, allows attackers to disable server certificate validation via the (1) HTTPS_CA_DIR or (2) HTTPS_CA_FILE environment variable.

5.8 Medium

CVSS2