Impact: Moderate Public Date: 2015-03-30 CWE: CWE-297 Bugzilla: 1209981: CVE-2015-1855 ruby: OpenSSL extension hostname matching implementation violates RFC 6125 It was discovered that the Ruby OpenSSL extension was overly permissive when verifying host names against X.509 certificate names with wildcards. This could cause Ruby TLS/SSL clients to accept certain certificates as valid, which is a violation of the RFC 6125 recommendations.
Find out more about CVE-2015-1855 from the MITRE CVE dictionary dictionary and NIST NVD.
This issue affects the versions of Ruby as shipped with Red Hat Enterprise Linux 5, 6, and 7, and Red Hat Software Collections. Red Hat Product Security has rated this issue as having Moderate security impact. A future updates may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.
NOTE: The following CVSS v2 metrics and score provided are preliminary and subject to review.
Base Score | 4 |
---|---|
Base Metrics | AV:N/AC:H/Au:N/C:P/I:P/A:N |
Access Vector | Network |
Access Complexity | High |
Authentication | None |
Confidentiality Impact | Partial |
Integrity Impact | Partial |
Availability Impact | None |
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Platform | Package | State |
---|---|---|
Red Hat Subscription Asset Manager 1 | ruby193-ruby | Will not fix |
Red Hat Software Collections for Red Hat Enterprise Linux | ruby200-ruby | Will not fix |
Red Hat Software Collections for Red Hat Enterprise Linux | ruby193-ruby | Will not fix |
Red Hat Software Collections for Red Hat Enterprise Linux | rh-ruby22-ruby | Not affected |
Red Hat Enterprise Linux OpenStack Platform 4.0 | ruby193-ruby | Will not fix |
Red Hat Enterprise Linux 7 | ruby | Fix deferred |
Red Hat Enterprise Linux 6 | ruby | Fix deferred |
Red Hat Enterprise Linux 5 | ruby | Will not fix |