[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249461

 
 

909

 
 

195508

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

Ruby - (bulletinjan2019)

ID: oval:org.secpod.oval:def:2103539Date: (C)2020-01-06   (M)2022-10-10
Class: PATCHFamily: unix




An issue was discovered in the OpenSSL library in Ruby before 2.3.8, 2.4.x before 2.4.5, 2.5.x before 2.5.2, and 2.6.x before 2.6.0-preview3. When two OpenSSL::X509::Name objects are compared using ==, depending on the ordering, non-equal objects may return true. When the first argument is one character longer than the second, or the second argument contains a character that is one less than a character in the same position of the first argument, the result of == will be true. This could be leveraged to create an illegitimate certificate that may be accepted as legitimate and then used in signing or encryption operations.

Platform:
Sun Solaris 11
Product:
runtime/ruby-23
runtime/ruby-23/ruby-tk
Reference:
bulletinjan2019
CVE-2018-16395
CVE-2018-16396
CVE    2
CVE-2018-16396
CVE-2018-16395
CPE    1
cpe:/o:oracle:solaris:11

© SecPod Technologies