The connect method in lib/net/http.rb in the (1) Net::HTTP and (2) Net::HTTPS libraries in Ruby 1.8.5 and 1.8.6 does not verify that the commonName (CN) field in a server certificate matches the domain name in an HTTPS request, which makes it easier for remote attackers to intercept SSL transmissions via a man-in-the-middle attack or spoofed web site.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Ruby | Ruby-lang | 1.8.5 (including) | 1.8.5 (including) |
Ruby | Ruby-lang | 1.8.6 (including) | 1.8.6 (including) |
Red Hat Enterprise Linux 4 | RedHat | ruby-0:1.8.1-7.EL4.8.1 | * |
Red Hat Enterprise Linux 5 | RedHat | ruby-0:1.8.5-5.el5_1.1 | * |
Libopenssl-ruby | Ubuntu | upstream | * |
Ruby1.8 | Ubuntu | dapper | * |
Ruby1.8 | Ubuntu | edgy | * |
Ruby1.8 | Ubuntu | feisty | * |
Ruby1.8 | Ubuntu | gutsy | * |
Ruby1.8 | Ubuntu | upstream | * |