CVE-2013-4073

The OpenSSL::SSL.verify_certificate_identity function in lib/openssl/ssl.rb in Ruby 1.8 before 1.8.7-p374, 1.9 before 1.9.3-p448, and 2.0 before 2.0.0-p247 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
References
Link Resource
http://forums.interworx.com/threads/8000-InterWorx-Version-5-0-14-Released-on-Beta-Channel%21
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
http://lists.opensuse.org/opensuse-updates/2013-07/msg00042.html
http://lists.opensuse.org/opensuse-updates/2013-07/msg00044.html
http://rhn.redhat.com/errata/RHSA-2013-1090.html
http://rhn.redhat.com/errata/RHSA-2013-1103.html
http://rhn.redhat.com/errata/RHSA-2013-1137.html
http://support.apple.com/kb/HT6150
http://www.debian.org/security/2013/dsa-2738
http://www.debian.org/security/2013/dsa-2809
http://www.ruby-lang.org/en/news/2013/06/27/hostname-check-bypassing-vulnerability-in-openssl-client-cve-2013-4073/ Vendor Advisory
http://www.ubuntu.com/usn/USN-1902-1
https://bugzilla.redhat.com/show_bug.cgi?id=979251
https://puppet.com/security/cve/cve-2013-4073
http://forums.interworx.com/threads/8000-InterWorx-Version-5-0-14-Released-on-Beta-Channel%21
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
http://lists.opensuse.org/opensuse-updates/2013-07/msg00042.html
http://lists.opensuse.org/opensuse-updates/2013-07/msg00044.html
http://rhn.redhat.com/errata/RHSA-2013-1090.html
http://rhn.redhat.com/errata/RHSA-2013-1103.html
http://rhn.redhat.com/errata/RHSA-2013-1137.html
http://support.apple.com/kb/HT6150
http://www.debian.org/security/2013/dsa-2738
http://www.debian.org/security/2013/dsa-2809
http://www.ruby-lang.org/en/news/2013/06/27/hostname-check-bypassing-vulnerability-in-openssl-client-cve-2013-4073/ Vendor Advisory
http://www.ubuntu.com/usn/USN-1902-1
https://bugzilla.redhat.com/show_bug.cgi?id=979251
https://puppet.com/security/cve/cve-2013-4073
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:ruby-lang:ruby:1.8.6-26:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.8.7:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.8.7:p160:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.8.7:p17:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.8.7:p173:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.8.7:p174:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.8.7:p22:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.8.7:p248:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.8.7:p249:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.8.7:p299:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.8.7:p301:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.8.7:p302:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.8.7:p330:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.8.7:p334:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.8.7:p352:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.8.7:p357:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.8.7:p358:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.8.7:p370:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.8.7:p371:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.8.7:p373:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.8.7:p71:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.8.7:p72:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.8.7:preview1:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.8.7:preview2:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.8.7:preview3:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.8.7:preview4:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.9.3:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.9.3:p0:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.9.3:p125:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.9.3:p194:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.9.3:p286:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.9.3:p383:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.9.3:p385:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.9.3:p392:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.9.3:p426:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.9.3:p429:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:2.0.0:p0:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:2.0.0:p195:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:2.0.0:preview1:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:2.0.0:preview2:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:2.0.0:rc1:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:2.0.0:rc2:*:*:*:*:*:*

History

21 Nov 2024, 01:54

Type Values Removed Values Added
References () http://forums.interworx.com/threads/8000-InterWorx-Version-5-0-14-Released-on-Beta-Channel%21 - () http://forums.interworx.com/threads/8000-InterWorx-Version-5-0-14-Released-on-Beta-Channel%21 -
References () http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html - () http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html -
References () http://lists.opensuse.org/opensuse-updates/2013-07/msg00042.html - () http://lists.opensuse.org/opensuse-updates/2013-07/msg00042.html -
References () http://lists.opensuse.org/opensuse-updates/2013-07/msg00044.html - () http://lists.opensuse.org/opensuse-updates/2013-07/msg00044.html -
References () http://rhn.redhat.com/errata/RHSA-2013-1090.html - () http://rhn.redhat.com/errata/RHSA-2013-1090.html -
References () http://rhn.redhat.com/errata/RHSA-2013-1103.html - () http://rhn.redhat.com/errata/RHSA-2013-1103.html -
References () http://rhn.redhat.com/errata/RHSA-2013-1137.html - () http://rhn.redhat.com/errata/RHSA-2013-1137.html -
References () http://support.apple.com/kb/HT6150 - () http://support.apple.com/kb/HT6150 -
References () http://www.debian.org/security/2013/dsa-2738 - () http://www.debian.org/security/2013/dsa-2738 -
References () http://www.debian.org/security/2013/dsa-2809 - () http://www.debian.org/security/2013/dsa-2809 -
References () http://www.ruby-lang.org/en/news/2013/06/27/hostname-check-bypassing-vulnerability-in-openssl-client-cve-2013-4073/ - Vendor Advisory () http://www.ruby-lang.org/en/news/2013/06/27/hostname-check-bypassing-vulnerability-in-openssl-client-cve-2013-4073/ - Vendor Advisory
References () http://www.ubuntu.com/usn/USN-1902-1 - () http://www.ubuntu.com/usn/USN-1902-1 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=979251 - () https://bugzilla.redhat.com/show_bug.cgi?id=979251 -
References () https://puppet.com/security/cve/cve-2013-4073 - () https://puppet.com/security/cve/cve-2013-4073 -

07 Nov 2023, 02:16

Type Values Removed Values Added
References
  • {'url': 'http://forums.interworx.com/threads/8000-InterWorx-Version-5-0-14-Released-on-Beta-Channel!', 'name': 'http://forums.interworx.com/threads/8000-InterWorx-Version-5-0-14-Released-on-Beta-Channel!', 'tags': [], 'refsource': 'CONFIRM'}
  • () http://forums.interworx.com/threads/8000-InterWorx-Version-5-0-14-Released-on-Beta-Channel%21 -

Information

Published : 2013-08-18 02:52

Updated : 2024-11-21 01:54


NVD link : CVE-2013-4073

Mitre link : CVE-2013-4073

CVE.ORG link : CVE-2013-4073


JSON object : View

Products Affected

ruby-lang

  • ruby
CWE
CWE-310

Cryptographic Issues