Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-16395

Опубликовано: 17 окт. 2018
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

An issue was discovered in the OpenSSL library in Ruby before 2.3.8, 2.4.x before 2.4.5, 2.5.x before 2.5.2, and 2.6.x before 2.6.0-preview3. When two OpenSSL::X509::Name objects are compared using ==, depending on the ordering, non-equal objects may return true. When the first argument is one character longer than the second, or the second argument contains a character that is one less than a character in the same position of the first argument, the result of == will be true. This could be leveraged to create an illegitimate certificate that may be accepted as legitimate and then used in signing or encryption operations.

Отчет

Subscription Asset Manager is now in a reduced support phase receiving only Critical impact security fixes. This issue has been rated as having a security impact of Important, and is not currently planned to be addressed in future updates. Red Hat Virtualization includes a vulnerable version of ruby, however the affected functionality is not used in Red Hat Virtualization or any of its dependencies. A future update may address this issue.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5rubyWill not fix
Red Hat Enterprise Linux 6rubyWill not fix
Red Hat Enterprise Linux 8rubyNot affected
Red Hat Subscription Asset Managerruby193Will not fix
Red Hat Virtualization 4rubyWill not fix
Red Hat Enterprise Linux 7rubyFixedRHSA-2018:373829.11.2018
Red Hat Enterprise Linux 7.4 Extended Update SupportrubyFixedRHSA-2019:194830.07.2019
Red Hat Enterprise Linux 7.5 Extended Update SupportrubyFixedRHSA-2019:256527.08.2019
Red Hat Software Collections for Red Hat Enterprise Linux 6rh-ruby23-rubyFixedRHSA-2018:372929.11.2018
Red Hat Software Collections for Red Hat Enterprise Linux 6rh-ruby24-rubyFixedRHSA-2018:373029.11.2018

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-295
https://bugzilla.redhat.com/show_bug.cgi?id=1643086ruby: OpenSSL::X509:: Name equality check does not work correctly

EPSS

Процентиль: 90%
0.05402
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 9.8
ubuntu
почти 7 лет назад

An issue was discovered in the OpenSSL library in Ruby before 2.3.8, 2.4.x before 2.4.5, 2.5.x before 2.5.2, and 2.6.x before 2.6.0-preview3. When two OpenSSL::X509::Name objects are compared using ==, depending on the ordering, non-equal objects may return true. When the first argument is one character longer than the second, or the second argument contains a character that is one less than a character in the same position of the first argument, the result of == will be true. This could be leveraged to create an illegitimate certificate that may be accepted as legitimate and then used in signing or encryption operations.

CVSS3: 9.8
nvd
почти 7 лет назад

An issue was discovered in the OpenSSL library in Ruby before 2.3.8, 2.4.x before 2.4.5, 2.5.x before 2.5.2, and 2.6.x before 2.6.0-preview3. When two OpenSSL::X509::Name objects are compared using ==, depending on the ordering, non-equal objects may return true. When the first argument is one character longer than the second, or the second argument contains a character that is one less than a character in the same position of the first argument, the result of == will be true. This could be leveraged to create an illegitimate certificate that may be accepted as legitimate and then used in signing or encryption operations.

CVSS3: 9.8
msrc
почти 5 лет назад

Описание отсутствует

CVSS3: 9.8
debian
почти 7 лет назад

An issue was discovered in the OpenSSL library in Ruby before 2.3.8, 2 ...

CVSS3: 9.8
github
больше 3 лет назад

Ruby Openssl Allows Incorrect Value Comparison

EPSS

Процентиль: 90%
0.05402
Низкий

7.5 High

CVSS3