CVE Vulnerabilities

CVE-2020-13645

Improper Certificate Validation

Published: May 28, 2020 | Modified: Nov 21, 2024
CVSS 3.x
6.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
CVSS 2.x
6.4 MEDIUM
AV:N/AC:L/Au:N/C:P/I:P/A:N
RedHat/V2
RedHat/V3
6.5 MODERATE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

In GNOME glib-networking through 2.64.2, the implementation of GTlsClientConnection skips hostname verification of the servers TLS certificate if the application fails to specify the expected server identity. This is in contrast to its intended documented behavior, to fail the certificate verification. Applications that fail to provide the server identity, including Balsa before 2.5.11 and 2.6.x before 2.6.1, accept a TLS certificate if the certificate is valid for any host.

Weakness

The product does not validate, or incorrectly validates, a certificate.

Affected Software

NameVendorStart VersionEnd Version
BalsaGnome*2.5.11 (excluding)
BalsaGnome2.6.0 (including)2.6.0 (including)
Glib-networkingGnome*2.62.4 (excluding)
Glib-networkingGnome2.64.0 (including)2.64.3 (excluding)
BalsaUbuntueoan*
BalsaUbuntuesm-apps/focal*
BalsaUbuntufocal*
BalsaUbuntutrusty*
Glib-networkingUbuntubionic*
Glib-networkingUbuntudevel*
Glib-networkingUbuntueoan*
Glib-networkingUbuntuesm-infra/bionic*
Glib-networkingUbuntuesm-infra/focal*
Glib-networkingUbuntuesm-infra/xenial*
Glib-networkingUbuntufocal*
Glib-networkingUbuntutrusty*
Glib-networkingUbuntuxenial*

Potential Mitigations

References