Description
The (1) Net::ftptls, (2) Net::telnets, (3) Net::imap, (4) Net::pop, and (5) Net::smtp libraries in Ruby 1.8.5 and 1.8.6 do not verify that the commonName (CN) field in a server certificate matches the domain name in a request sent over SSL, which makes it easier for remote attackers to intercept SSL transmissions via a man-in-the-middle attack or spoofed web site, different components than CVE-2007-5162.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1410-1 | New ruby1.8 packages fix insecure SSL certificate validation |
Debian DSA |
DSA-1411-1 | New libopenssl-ruby packages fix insecure SSL certificate validation |
Debian DSA |
DSA-1412-1 | New ruby1.9 packages fix insecure SSL certificate validation |
Ubuntu USN |
USN-596-1 | Ruby vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T15:39:13.628Z
Reserved: 2007-11-01T00:00:00.000Z
Link: CVE-2007-5770
No data.
Status : Modified
Published: 2007-11-14T01:46:00.000
Modified: 2026-04-23T00:35:47.467
Link: CVE-2007-5770
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
Ubuntu USN