Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
CVE-2013-4073
CVE information
Published
Last Modified
CVSSv2.0 Severity
Impact Analysis
Description
The OpenSSL::SSL.verify_certificate_identity function in lib/openssl/ssl.rb in Ruby 1.8 before 1.8.7-p374, 1.9 before 1.9.3-p448, and 2.0 before 2.0.0-p247 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408..
CVSSv2.0 Score
- Severity
- Medium
- Base Score
- 6.8/10
- Exploit Score
- 8.6/10
- Access Vector
- Network
- Access Complexity
- Medium
- Authentication Required
- None
- Impact Score
- 6.4/10
- Confidentiality Impact
- Partial
- Availability Impact
- Partial
- Integrity Impact
- Partial
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:a:ruby-lang:ruby:1.8.7:p370:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:ruby-lang:ruby:1.9.3:p426:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:ruby-lang:ruby:1.8.7:p330:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:ruby-lang:ruby:1.8.7:p334:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:ruby-lang:ruby:1.8.7:p248:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:ruby-lang:ruby:1.8.7:preview3:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:ruby-lang:ruby:1.8.7:p17:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:ruby-lang:ruby:1.8.6-26:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:ruby-lang:ruby:1.9.3:p286:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:ruby-lang:ruby:1.9.3:p385:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:ruby-lang:ruby:1.8.7:p371:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:ruby-lang:ruby:1.8.7:p299:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:ruby-lang:ruby:1.9.3:p383:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:ruby-lang:ruby:2.0.0:p195:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:ruby-lang:ruby:1.9.3:p429:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:ruby-lang:ruby:1.8.7:p357:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:ruby-lang:ruby:1.8.7:p71:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:ruby-lang:ruby:1.8.7:p22:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:ruby-lang:ruby:2.0.0:preview1:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:ruby-lang:ruby:1.8.7:p352:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:ruby-lang:ruby:1.8.7:p301:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:ruby-lang:ruby:1.8.7:p358:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:ruby-lang:ruby:1.8.7:p160:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:ruby-lang:ruby:1.8.7:preview2:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:ruby-lang:ruby:1.8.7:p174:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:ruby-lang:ruby:2.0.0:p0:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:ruby-lang:ruby:1.9.3:p125:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:ruby-lang:ruby:2.0.0:rc1:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:ruby-lang:ruby:2.0.0:preview2:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:ruby-lang:ruby:1.9.3:p194:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:ruby-lang:ruby:1.8.7:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:ruby-lang:ruby:1.8.7:p173:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:ruby-lang:ruby:1.8.7:p249:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:ruby-lang:ruby:1.9.3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:ruby-lang:ruby:1.9.3:p392:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:ruby-lang:ruby:2.0.0:rc2:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:ruby-lang:ruby:1.8.7:preview1:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:ruby-lang:ruby:1.8.7:p302:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:ruby-lang:ruby:1.8.7:p72:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:ruby-lang:ruby:1.8.7:p373:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:ruby-lang:ruby:1.9.3:p0:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:ruby-lang:ruby:1.8.7:preview4:*:*:*:*:*:* |
Yes
|
- | - |
References
- http://www.ruby-lang.org/en/news/2013/06/27/hostname-check-bypassing-vulnerability-in-op
- https://bugzilla.redhat.com/show_bug.cgi?id=979251
- http://rhn.redhat.com/errata/RHSA-2013-1103.html
- http://lists.opensuse.org/opensuse-updates/2013-07/msg00042.html
- http://rhn.redhat.com/errata/RHSA-2013-1090.html
- http://lists.opensuse.org/opensuse-updates/2013-07/msg00044.html
- http://rhn.redhat.com/errata/RHSA-2013-1137.html
- http://www.ubuntu.com/usn/USN-1902-1
- http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
- http://www.debian.org/security/2013/dsa-2809
- http://www.debian.org/security/2013/dsa-2738
- http://support.apple.com/kb/HT6150
- https://puppet.com/security/cve/cve-2013-4073
- http://forums.interworx.com/threads/8000-InterWorx-Version-5-0-14-Released-on-Beta-Chann