ext/openssl/ossl_ocsp.c in Ruby 1.8 and 1.9 does not properly check the return value from the OCSP_basic_verify function, which might allow remote attackers to successfully present an invalid X.509 certificate, possibly involving a revoked certificate.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Link | Tags |
---|---|
http://secunia.com/advisories/35937 | third party advisory |
http://redmine.ruby-lang.org/issues/show/1091 | exploit |
https://exchange.xforce.ibmcloud.com/vulnerabilities/48761 | vdb entry |
http://www.redhat.com/support/errata/RHSA-2009-1140.html | vendor advisory |
http://www.ubuntu.com/usn/USN-805-1 | vendor advisory |
http://www.securityfocus.com/bid/33769 | vdb entry |
http://www.securitytracker.com/id?1022505 | vdb entry |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11450 | vdb entry signature |
http://secunia.com/advisories/35699 | third party advisory |
http://www.mandriva.com/security/advisories?name=MDVSA-2009:193 | vendor advisory |
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=513528 | |
http://secunia.com/advisories/33750 | third party advisory |