Описание
PyWBEM 0.7 and earlier uses a separate connection to validate X.509 certificates, which allows man-in-the-middle attackers to spoof a peer via an arbitrary certificate.
| Релиз | Статус | Примечание |
|---|---|---|
| artful | ignored | end of life |
| bionic | not-affected | 0.8.0~dev650-1 |
| cosmic | ignored | end of life |
| devel | DNE | |
| disco | not-affected | 0.8.0~dev650-1 |
| esm-apps/bionic | not-affected | 0.8.0~dev650-1 |
| esm-apps/xenial | not-affected | 0.8.0~dev650-1 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was needs-triage] |
| lucid | ignored | end of life |
| precise | ignored | end of life |
Показывать по
EPSS
5.8 Medium
CVSS2
Связанные уязвимости
PyWBEM 0.7 and earlier uses a separate connection to validate X.509 certificates, which allows man-in-the-middle attackers to spoof a peer via an arbitrary certificate.
PyWBEM 0.7 and earlier uses a separate connection to validate X.509 certificates, which allows man-in-the-middle attackers to spoof a peer via an arbitrary certificate.
PyWBEM 0.7 and earlier uses a separate connection to validate X.509 certificates, which allows man-in-the-middle attackers to spoof a peer via an arbitrary certificate.
PyWBEM 0.7 and earlier uses a separate connection to validate X.509 ce ...
PyWBEM TOCTOU vulnerability in certificate validation
EPSS
5.8 Medium
CVSS2