CVE-2017-10789
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The DBD::mysql module through 4.043 for Perl uses the mysql_ssl=1 setting to mean that SSL is optional (even though this setting's documentation has a "your communication with the server will be encrypted" statement), which allows man-in-the-middle attackers to spoof servers via a cleartext-downgrade attack, a related issue to CVE-2015-3152.
El módulo DBD::mysql hasta la versión 4.043 para Perl, usa la configuración mysql_ssl=1 para definir que SSL es opcional (aunque la documentación de esta configuración tiene una instrucción "your communication with the server will be encrypted"), lo que permite a atacantes de tipo man-in-the-middle suplantar servidores por medio de un ataque de degradación de texto sin cifrar, un problema relacionado con el CVE-2015-3152.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2017-07-01 CVE Reserved
- 2017-07-01 CVE Published
- 2023-05-08 EPSS Updated
- 2024-08-05 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
References (4)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/99364 | Third Party Advisory | |
https://github.com/perl5-dbi/DBD-mysql/issues/110 | Third Party Advisory | |
https://github.com/perl5-dbi/DBD-mysql/issues/140 | X_refsource_misc | |
https://github.com/perl5-dbi/DBD-mysql/pull/114 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Dbd-mysql Project Search vendor "Dbd-mysql Project" | Dbd-mysql Search vendor "Dbd-mysql Project" for product "Dbd-mysql" | <= 4.043 Search vendor "Dbd-mysql Project" for product "Dbd-mysql" and version " <= 4.043" | - |
Affected
|