FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

CVE-2013-4073

This CVE name corresponds to:

Entered Topic
2013-07-11 ruby -- Hostname check bypassing vulnerability in SSL client

The following information is adapted from the Common Vulnerabilities and Exposures (CVE) project. CVE and the CVE logo are trademarks of The MITRE Corporation. CVE content is Copyright 2005, The MITRE Corporation.

Details

Type Candidate
Name CVE-2013-4073
Phase Assigned(20130609)

Description

The OpenSSL::SSL.verify_certificate_identity function in lib/openssl/ssl.rb in Ruby 1.8 before 1.8.7-p374, 1.9 before 1.9.3-p448, and 2.0 before 2.0.0-p247 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.

References

Source Reference
CONFIRM http://www.ruby-lang.org/en/news/2013/06/27/hostname-check-bypassing-vulnerability-in-openssl-client-cve-2013-4073/
CONFIRM https://bugzilla.redhat.com/show_bug.cgi?id=979251
CONFIRM http://support.apple.com/kb/HT6150
CONFIRM http://forums.interworx.com/threads/8000-InterWorx-Version-5-0-14-Released-on-Beta-Channel!
APPLE APPLE-SA-2013-10-22-3
DEBIAN DSA-2809
DEBIAN DSA-2738
REDHAT RHSA-2013:1090
REDHAT RHSA-2013:1103
REDHAT RHSA-2013:1137
SUSE openSUSE-SU-2013:1181
SUSE openSUSE-SU-2013:1186
UBUNTU USN-1902-1