Lucene search

K
debianDebianDEBIAN:DLA-224-1:7FCBA
HistoryMay 18, 2015 - 9:57 p.m.

[SECURITY] [DLA 224-1] ruby1.8 security update

2015-05-1821:57:18
lists.debian.org
6

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.028 Low

EPSS

Percentile

90.5%

Package : ruby1.8
Version : 1.8.7.302-2squeeze4
CVE ID : CVE-2015-1855

It was discovered that the Ruby OpenSSL extension, part of the
interpreter for the Ruby language, did not properly implement hostname
matching, in violation of RFC 6125. This could allow remote attackers to
perform a man-in-the-middle attack via crafted SSL certificates.

For the oldoldstable distribution (squeeze), this problem has been
fixed in version 1.8.7.302-2squeeze4.

For the oldstable distribution (wheezy), this problem was fixed in
version 1.8.7.358-7.1+deb7u3.

–
Ben Hutchings - Debian developer, member of Linux kernel and LTS teams

Attachment:
signature.asc
Description: This is a digitally signed message part

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.028 Low

EPSS

Percentile

90.5%