CVE-2019-3890

It was discovered evolution-ews before 3.31.3 does not check the validity of SSL certificates. An attacker could abuse this flaw to get confidential information by tricking the user into connecting to a fake server without the user noticing the difference.
Configurations

Configuration 1 (hide)

cpe:2.3:a:gnome:evolution-ews:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*

History

21 Nov 2024, 04:42

Type Values Removed Values Added
References () https://access.redhat.com/errata/RHSA-2019:3699 - () https://access.redhat.com/errata/RHSA-2019:3699 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3890 - Issue Tracking, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3890 - Issue Tracking, Third Party Advisory
References () https://gitlab.gnome.org/GNOME/evolution-ews/issues/27 - Issue Tracking, Third Party Advisory () https://gitlab.gnome.org/GNOME/evolution-ews/issues/27 - Issue Tracking, Third Party Advisory

Information

Published : 2019-08-01 14:15

Updated : 2024-11-21 04:42


NVD link : CVE-2019-3890

Mitre link : CVE-2019-3890

CVE.ORG link : CVE-2019-3890


JSON object : View

Products Affected

gnome

  • evolution-ews

redhat

  • enterprise_linux
CWE
CWE-295

Improper Certificate Validation

CWE-296

Improper Following of a Certificate's Chain of Trust