CVE-2015-1855

Public on 2015-05-27
Modified on 2024-04-22
Description
It was discovered that the Ruby OpenSSL extension was overly permissive when verifying host names against X.509 certificate names with wildcards. This could cause Ruby TLS/SSL clients to accept certain certificates as valid, which is a violation of the RFC 6125 recommendations.
Severity
Medium severity
Medium
CVSS v3 Base Score
5.9
See breakdown

Affected Packages

Platform Package Release Date Advisory Status
Amazon Linux 1 ruby No Fix Planned
Amazon Linux 2 - Core ruby Not Affected
Amazon Linux 1 ruby18 2015-05-27 ALAS-2015-529 Fixed
Amazon Linux 1 ruby19 2015-05-27 ALAS-2015-530 Fixed
Amazon Linux 1 ruby20 2015-05-27 ALAS-2015-531 Fixed
Amazon Linux 1 ruby21 2015-05-27 ALAS-2015-532 Fixed
Amazon Linux 1 ruby22 2015-05-27 ALAS-2015-533 Fixed
Amazon Linux 1 ruby23 No Fix Planned
Amazon Linux 1 ruby24 No Fix Planned
Amazon Linux 2023 ruby3.2 Not Affected

CVSS Scores

Score Type Score Vector
Amazon Linux CVSSv3 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
NVD CVSSv2 4.3 AV:N/AC:M/Au:N/C:N/I:P/A:N
NVD CVSSv3 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N