CVE Vulnerabilities

CVE-2020-13645

Improper Certificate Validation

Published: May 28, 2020 | Modified: Nov 07, 2023
CVSS 3.x
6.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
CVSS 2.x
6.4 MEDIUM
AV:N/AC:L/Au:N/C:P/I:P/A:N
RedHat/V2
RedHat/V3
6.5 MODERATE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Ubuntu
MEDIUM

In GNOME glib-networking through 2.64.2, the implementation of GTlsClientConnection skips hostname verification of the servers TLS certificate if the application fails to specify the expected server identity. This is in contrast to its intended documented behavior, to fail the certificate verification. Applications that fail to provide the server identity, including Balsa before 2.5.11 and 2.6.x before 2.6.1, accept a TLS certificate if the certificate is valid for any host.

Weakness

The product does not validate, or incorrectly validates, a certificate.

Affected Software

Name Vendor Start Version End Version
Balsa Gnome * 2.5.11 (excluding)
Balsa Gnome 2.6.0 (including) 2.6.0 (including)
Glib-networking Gnome * 2.62.4 (excluding)
Glib-networking Gnome 2.64.0 (including) 2.64.3 (excluding)
Balsa Ubuntu eoan *
Balsa Ubuntu focal *
Balsa Ubuntu trusty *
Glib-networking Ubuntu bionic *
Glib-networking Ubuntu devel *
Glib-networking Ubuntu eoan *
Glib-networking Ubuntu focal *
Glib-networking Ubuntu trusty *
Glib-networking Ubuntu xenial *

Potential Mitigations

References