CVE-2009-3024
Published Aug 31, 2009
Last updated 14 years ago
Overview
- Description
- The verify_hostname_of_cert function in the certificate checking feature in IO-Socket-SSL (IO::Socket::SSL) 1.14 through 1.25 only matches the prefix of a hostname when no wildcard is used, which allows remote attackers to bypass the hostname check for a certificate.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.3
- Impact score
- 2.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- CWE-310
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:io-socket-ssl:io-socket-ssl:1.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "80EEE704-744B-487E-89D0-C38F0F0F00D1" }, { "criteria": "cpe:2.3:a:io-socket-ssl:io-socket-ssl:1.15:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "50AF3CCC-A126-40C2-BDE8-A376F286A5FE" }, { "criteria": "cpe:2.3:a:io-socket-ssl:io-socket-ssl:1.16:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E7922D38-6AD7-4D81-AF30-623BB8234E69" }, { "criteria": "cpe:2.3:a:io-socket-ssl:io-socket-ssl:1.16_1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "760ED2EB-9255-49A4-AFE7-4DD960215BD8" }, { "criteria": "cpe:2.3:a:io-socket-ssl:io-socket-ssl:1.16_2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7131102E-BEDB-4D63-9005-0EB646CAA918" }, { "criteria": "cpe:2.3:a:io-socket-ssl:io-socket-ssl:1.16_3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "064EBF4B-37EF-4334-87B4-EC4407A4F621" }, { "criteria": "cpe:2.3:a:io-socket-ssl:io-socket-ssl:1.17:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "288417CD-C82F-48DE-9D9F-897E3A6EB833" }, { "criteria": "cpe:2.3:a:io-socket-ssl:io-socket-ssl:1.18:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2BEE69A2-16BF-4E7B-9985-BFDFA5354DB9" }, { "criteria": "cpe:2.3:a:io-socket-ssl:io-socket-ssl:1.19:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9AED6875-A544-4608-9277-E82C5977D9EB" }, { "criteria": "cpe:2.3:a:io-socket-ssl:io-socket-ssl:1.20:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "669BA841-F8D7-4E4D-B9B5-776248A7C9D9" }, { "criteria": "cpe:2.3:a:io-socket-ssl:io-socket-ssl:1.21:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7FA78DEB-D81F-4442-ABF1-37FD5226EC12" }, { "criteria": "cpe:2.3:a:io-socket-ssl:io-socket-ssl:1.22:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "58BAC664-C570-4F8F-9CAB-8DEF9A3D54CD" }, { "criteria": "cpe:2.3:a:io-socket-ssl:io-socket-ssl:1.23:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "82C2F301-5CD4-4729-BC62-16B60E0EC9BA" }, { "criteria": "cpe:2.3:a:io-socket-ssl:io-socket-ssl:1.24:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "75C353EA-2FCC-4B0C-A4E7-CD8E0AC89255" }, { "criteria": "cpe:2.3:a:io-socket-ssl:io-socket-ssl:1.25:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8E6CA710-EC56-46A1-9114-48E928DFFB6D" } ], "operator": "OR" } ] } ]