5.9
CVSSv3

CVE-2015-1777

Published: 12/04/2018 Updated: 22/04/2019
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 5.9 | Impact Score: 3.6 | Exploitability Score: 2.2
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

rhnreg_ks in Red Hat Network Client Tools (aka rhn-client-tools) on Red Hat Gluster Storage 2.1 and Enterprise Linux (RHEL) 5, 6, and 7 does not properly validate hostnames in X.509 certificates from SSL servers, which allows remote malicious users to prevent system registration via a man-in-the-middle attack.

Vulnerable Product Search on Vulmon Subscribe to Product

redhat rhn-client-tools

Vendor Advisories

Debian Bug report logs - #779817 rhn-client-tools: CVE-2015-1777 Package: rhn-client-tools; Maintainer for rhn-client-tools is Bernd Zeimetz <bzed@debianorg>; Source for rhn-client-tools is src:rhn-client-tools (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@inutilorg> Date: Thu, 5 Mar 2015 07:03:01 UTC ...
rhnreg_ks in Red Hat Network Client Tools (aka rhn-client-tools) on Red Hat Gluster Storage 21 and Enterprise Linux (RHEL) 5, 6, and 7 does not properly validate hostnames in X509 certificates from SSL servers, which allows remote attackers to prevent system registration via a man-in-the-middle attack ...