The (1) Net::ftptls, (2) Net::telnets, (3) Net::imap, (4) Net::pop, and (5) Net::smtp libraries in Ruby 1.8.5 and 1.8.6 do not verify that the commonName (CN) field in a server certificate matches the domain name in a request sent over SSL, which makes it easier for remote attackers to intercept SSL transmissions via a man-in-the-middle attack or spoofed web site, different components than CVE-2007-5162.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Ruby | Ruby-lang | 1.8.5 (including) | 1.8.5 (including) |
Ruby | Ruby-lang | 1.8.6 (including) | 1.8.6 (including) |
Libopenssl-ruby | Ubuntu | upstream | * |
Ruby1.8 | Ubuntu | dapper | * |
Ruby1.8 | Ubuntu | edgy | * |
Ruby1.8 | Ubuntu | feisty | * |
Ruby1.8 | Ubuntu | gutsy | * |
Ruby1.8 | Ubuntu | upstream | * |
Red Hat Enterprise Linux 4 | RedHat | ruby-0:1.8.1-7.EL4.8.1 | * |
Red Hat Enterprise Linux 5 | RedHat | ruby-0:1.8.5-5.el5_1.1 | * |