Lucene search

K
ubuntucveUbuntu.comUB:CVE-2020-36658
HistoryJan 27, 2023 - 12:00 a.m.

CVE-2020-36658

2023-01-2700:00:00
ubuntu.com
ubuntu.com
14
cve-2020-36658
apache::session::ldap
x.509 certificate
validity
not checked
default configuration
net::ldaps
perl
remote ldap backends
fix
cve-2020-16093
unix

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

45.1%

In Apache::Session::LDAP before 0.5, validity of the X.509 certificate is
not checked by default when connecting to remote LDAP backends, because the
default configuration of the Net::LDAPS module for Perl is used. NOTE: this
can, for example, be fixed in conjunction with the CVE-2020-16093 fix.

OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchlibapache-session-ldap-perl< 0.4-1ubuntu0.18.04.1~esm1UNKNOWN
ubuntu20.04noarchlibapache-session-ldap-perl< 0.4-1+deb10u1build0.20.04.1UNKNOWN
ubuntu16.04noarchlibapache-session-ldap-perl< 0.4-1ubuntu0.16.04.1~esm1UNKNOWN

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

45.1%