Page 11 of 52 results (0.017 seconds)

CVSS: 5.0EPSS: 1%CPEs: 2EXPL: 0

The (1) Net::ftptls, (2) Net::telnets, (3) Net::imap, (4) Net::pop, and (5) Net::smtp libraries in Ruby 1.8.5 and 1.8.6 do not verify that the commonName (CN) field in a server certificate matches the domain name in a request sent over SSL, which makes it easier for remote attackers to intercept SSL transmissions via a man-in-the-middle attack or spoofed web site, different components than CVE-2007-5162. Las librerias (1) Net::ftptls, (2) Net::telnets, (3) Net::imap, (4) Net::pop, y (5) Net::smtp en Ruby 1.8.5 y 1.8.6 no verifica el campo commonName (CN) en un servidor que valida certificados el nombre de dominio en una respuesta enviada sobre SSL, lo cual hace más facil a los atacantes remotos interceptar transmisiones SSL a través de un ataque de hombre en el medio o suplantando el sitio web, un componente diferente que el CVE-2007-5162. • http://docs.info.apple.com/article.html?artnum=307179 http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html http://secunia.com/advisories/26985 http://secunia.com/advisories/27576 http://secunia.com/advisories/27673 http://secunia.com/advisories/27756 http://secunia.com/advisories/27764 http://secunia.com/advisories/27769 http://secunia.com/advisories/27818 http://secunia.com/advisories/28136 http://secunia.com/advisories/28645 http://secunia.com/advisories&#x • CWE-287: Improper Authentication •

CVSS: 4.3EPSS: 2%CPEs: 2EXPL: 0

The connect method in lib/net/http.rb in the (1) Net::HTTP and (2) Net::HTTPS libraries in Ruby 1.8.5 and 1.8.6 does not verify that the commonName (CN) field in a server certificate matches the domain name in an HTTPS request, which makes it easier for remote attackers to intercept SSL transmissions via a man-in-the-middle attack or spoofed web site. El método connect en lib/net/http.rb en las bibliotecas (1) Net::HTTP y (2) Net::HTTPS de Ruby 1.8.5 y 1.8.6 no verifica que el campo commonName (CN) en un certificado de servidor concuerde con el nombre de dominio de una petición HTTPS, lo cual facilita a atacantes remotos interceptar transmisiones SSL mediante un ataque de "hombre en medio" (man-in-the-middle) o sitio web falsificado. • http://secunia.com/advisories/26985 http://secunia.com/advisories/27044 http://secunia.com/advisories/27432 http://secunia.com/advisories/27576 http://secunia.com/advisories/27673 http://secunia.com/advisories/27756 http://secunia.com/advisories/27764 http://secunia.com/advisories/27769 http://secunia.com/advisories/27818 http://secunia.com/advisories/28645 http://secunia.com/advisories/29556 http://securityreason.com/securityalert/3180 http://svn.ruby-lang.org/cgi-bin/vi • CWE-287: Improper Authentication •