CVE-2015-1855
Public on 2015-05-27
Modified on 2024-04-22
Description
It was discovered that the Ruby OpenSSL extension was overly permissive when verifying host names against X.509 certificate names with wildcards. This could cause Ruby TLS/SSL clients to accept certain certificates as valid, which is a violation of the RFC 6125 recommendations.
Severity
CVSS v3 Base Score
See breakdown
Affected Packages
Platform | Package | Release Date | Advisory | Status |
---|---|---|---|---|
Amazon Linux 1 | ruby | No Fix Planned | ||
Amazon Linux 2 - Core | ruby | Not Affected | ||
Amazon Linux 1 | ruby18 | 2015-05-27 | ALAS-2015-529 | Fixed |
Amazon Linux 1 | ruby19 | 2015-05-27 | ALAS-2015-530 | Fixed |
Amazon Linux 1 | ruby20 | 2015-05-27 | ALAS-2015-531 | Fixed |
Amazon Linux 1 | ruby21 | 2015-05-27 | ALAS-2015-532 | Fixed |
Amazon Linux 1 | ruby22 | 2015-05-27 | ALAS-2015-533 | Fixed |
Amazon Linux 1 | ruby23 | No Fix Planned | ||
Amazon Linux 1 | ruby24 | No Fix Planned | ||
Amazon Linux 2023 | ruby3.2 | Not Affected |
CVSS Scores
Score Type | Score | Vector | |
---|---|---|---|
Amazon Linux | CVSSv3 | 5.9 | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N |
NVD | CVSSv2 | 4.3 | AV:N/AC:M/Au:N/C:N/I:P/A:N |
NVD | CVSSv3 | 5.9 | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N |