Описание
An issue was discovered in Ruby through 2.6.7, 2.7.x through 2.7.3, and 3.x through 3.0.1. Net::IMAP does not raise an exception when StartTLS fails with an an unknown response, which might allow man-in-the-middle attackers to bypass the TLS protections by leveraging a network position between the client and the registry to block the StartTLS command, aka a "StartTLS stripping attack."
Релиз | Статус | Примечание |
---|---|---|
bionic | DNE | |
devel | DNE | |
esm-infra-legacy/trusty | DNE | |
esm-infra/focal | DNE | |
focal | DNE | |
groovy | DNE | |
hirsute | DNE | |
impish | DNE | |
jammy | DNE | |
trusty | ignored | end of standard support |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
bionic | DNE | |
devel | DNE | |
esm-infra-legacy/trusty | DNE | |
esm-infra/focal | DNE | |
focal | DNE | |
groovy | DNE | |
hirsute | DNE | |
impish | DNE | |
jammy | DNE | |
trusty | ignored | end of standard support |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
bionic | DNE | |
devel | DNE | |
esm-infra-legacy/trusty | DNE | |
esm-infra/focal | DNE | |
esm-infra/xenial | released | 2.3.1-2~ubuntu16.04.16+esm1 |
focal | DNE | |
groovy | DNE | |
hirsute | DNE | |
impish | DNE | |
jammy | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
bionic | released | 2.5.1-1ubuntu1.10 |
devel | DNE | |
esm-infra-legacy/trusty | DNE | |
esm-infra/bionic | not-affected | 2.5.1-1ubuntu1.10 |
esm-infra/focal | DNE | |
focal | DNE | |
groovy | DNE | |
hirsute | DNE | |
impish | DNE | |
jammy | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
bionic | DNE | |
esm-infra-legacy/trusty | DNE | |
esm-infra/focal | not-affected | 2.7.0-5ubuntu1.5 |
focal | released | 2.7.0-5ubuntu1.5 |
groovy | released | 2.7.1-3ubuntu1.4 |
hirsute | released | 2.7.2-4ubuntu1.2 |
impish | released | 2.7.4-1ubuntu1 |
trusty | DNE | |
trusty/esm | DNE | |
upstream | needs-triage |
Показывать по
5.8 Medium
CVSS2
7.4 High
CVSS3
Связанные уязвимости
An issue was discovered in Ruby through 2.6.7, 2.7.x through 2.7.3, and 3.x through 3.0.1. Net::IMAP does not raise an exception when StartTLS fails with an an unknown response, which might allow man-in-the-middle attackers to bypass the TLS protections by leveraging a network position between the client and the registry to block the StartTLS command, aka a "StartTLS stripping attack."
An issue was discovered in Ruby through 2.6.7, 2.7.x through 2.7.3, and 3.x through 3.0.1. Net::IMAP does not raise an exception when StartTLS fails with an an unknown response, which might allow man-in-the-middle attackers to bypass the TLS protections by leveraging a network position between the client and the registry to block the StartTLS command, aka a "StartTLS stripping attack."
An issue was discovered in Ruby through 2.6.7, 2.7.x through 2.7.3, an ...
An issue was discovered in Ruby through 2.6.7, 2.7.x through 2.7.3, and 3.x through 3.0.1. Net::IMAP does not raise an exception when StartTLS fails with an an unknown response, which might allow man-in-the-middle attackers to bypass the TLS protections by leveraging a network position between the client and the registry to block the StartTLS command, aka a "StartTLS stripping attack."
Уязвимость реализации класса Net::IMAP интерпретатора Ruby, позволяющая нарушителю реализовать атаку типа «человек посередине»
5.8 Medium
CVSS2
7.4 High
CVSS3