Ruby-lang OpenSSL 0.2.0 for Ruby

CPE Details

Ruby-lang OpenSSL 0.2.0 for Ruby
0.2.0
2019-09-26
15h44 +00:00
2019-09-26
15h44 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:ruby-lang:openssl:0.2.0:*:*:*:*:ruby:*:*

Informations

Vendor

ruby-lang

Product

openssl

Version

0.2.0

Target Software

ruby

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2018-16395 2018-11-16 17h00 +00:00 An issue was discovered in the OpenSSL library in Ruby before 2.3.8, 2.4.x before 2.4.5, 2.5.x before 2.5.2, and 2.6.x before 2.6.0-preview3. When two OpenSSL::X509::Name objects are compared using ==, depending on the ordering, non-equal objects may return true. When the first argument is one character longer than the second, or the second argument contains a character that is one less than a character in the same position of the first argument, the result of == will be true. This could be leveraged to create an illegitimate certificate that may be accepted as legitimate and then used in signing or encryption operations.
9.8
Critique
CVE-2016-7798 2017-01-30 21h00 +00:00 The openssl gem for Ruby uses the same initialization vector (IV) in GCM Mode (aes-*-gcm) when the IV is set before the key, which makes it easier for context-dependent attackers to bypass the encryption protection mechanism.
7.5
Haute