Lucene search

K
ubuntucveUbuntu.comUB:CVE-2014-3230
HistoryMay 07, 2014 - 12:00 a.m.

CVE-2014-3230

2014-05-0700:00:00
ubuntu.com
ubuntu.com
6

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N

0.002 Low

EPSS

Percentile

60.9%

The libwww-perl LWP::Protocol::https module 6.04 through 6.06 for Perl,
when using IO::Socket::SSL as the SSL socket class, allows attackers to
disable server certificate validation via the (1) HTTPS_CA_DIR or (2)
HTTPS_CA_FILE environment variable.

Bugs

Notes

Author Note
jdstrand per Debian, introduced by https://github.com/dagolden/lwp-protocol-https/commit/bcc46ce2dab53d2e2baa583f2243d6fc7d36dcc8 fix for https://rt.cpan.org/Public/Bug/Display.html?id=81948 introduced the bug (6.04)
mdeslaur as of 2014-06-27, proposed patch is still being discussed
OSVersionArchitecturePackageVersionFilename
ubuntu14.04noarchliblwp-protocol-https-perl< 6.04-2ubuntu0.1UNKNOWN

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N

0.002 Low

EPSS

Percentile

60.9%