Описание
PyWBEM 0.7 and earlier does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
| Релиз | Статус | Примечание |
|---|---|---|
| artful | ignored | end of life |
| bionic | released | 0.8.0~dev650-1 |
| cosmic | released | 0.8.0~dev650-1 |
| devel | released | 0.8.0~dev650-1 |
| esm-apps/bionic | released | 0.8.0~dev650-1 |
| esm-apps/xenial | released | 0.8.0~dev650-1 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was released [0.7.0-4ubuntu1~14.04.1]] |
| lucid | ignored | end of life |
| precise | ignored | end of life |
| precise/esm | DNE | precise was needs-triage |
Показывать по
EPSS
5.8 Medium
CVSS2
Связанные уязвимости
PyWBEM 0.7 and earlier does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
PyWBEM 0.7 and earlier does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
PyWBEM 0.7 and earlier does not verify that the server hostname matche ...
EPSS
5.8 Medium
CVSS2