Lucene search

K
ubuntuUbuntuUSN-2292-1
HistoryJul 17, 2014 - 12:00 a.m.

LWP::Protocol::https vulnerability

2014-07-1700:00:00
ubuntu.com
37

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N

5.7 Medium

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

60.9%

Releases

  • Ubuntu 14.04 ESM

Packages

  • liblwp-protocol-https-perl - HTTPS driver for LWP::UserAgent

Details

It was discovered that the LWP::Protocol::https perl module incorrectly
disabled peer certificate verification completely when only hostname
verification was requested to be disabled. If a remote attacker were able
to perform a machine-in-the-middle attack, this flaw could possibly be
exploited in certain scenarios to alter or compromise confidential
information in applications that used the LWP::Protocol::https module.

OSVersionArchitecturePackageVersionFilename
Ubuntu14.04noarchliblwp-protocol-https-perl< 6.04-2ubuntu0.1UNKNOWN

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N

5.7 Medium

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

60.9%