[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

CVE-2020-13645 -- glib-networking

ID: oval:org.secpod.oval:def:2004104Date: (C)2020-10-08   (M)2023-12-20
Class: VULNERABILITYFamily: unix




In GNOME glib-networking through 2.64.2, the implementation of GTlsClientConnection skips hostname verification of the server"s TLS certificate if the application fails to specify the expected server identity. This is in contrast to its intended documented behavior, to fail the certificate verification. Applications that fail to provide the server identity, including Balsa before 2.5.11 and 2.6.x before 2.6.1, accept a TLS certificate if the certificate is valid for any host.

Platform:
Debian 10.x
Debian 9.x
Product:
glib-networking
Reference:
CVE-2020-13645
CVE    1
CVE-2020-13645
CPE    3
cpe:/o:debian:debian_linux:10.x
cpe:/o:debian:debian_linux:9.x
cpe:/a:gnome:glib-networking

© SecPod Technologies