ID CVE-2013-2100
Summary The urlopen function in pym/portage/util/_urlopen.py in Gentoo Portage 2.1.12, when using HTTPS, does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and modify binary package lists via a crafted certificate.
References
Vulnerable Configurations
  • cpe:2.3:a:gentoo:portage:2.1.12:*:*:*:*:*:*:*
    cpe:2.3:a:gentoo:portage:2.1.12:*:*:*:*:*:*:*
CVSS
Base: 9.3 (as of 29-08-2017 - 01:33)
Impact:
Exploitability:
CWE CWE-310
CAPEC
  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:N/AC:M/Au:N/C:C/I:C/A:C
refmap via4
bid 59878
confirm https://bugs.gentoo.org/show_bug.cgi?id=469888
gentoo GLSA-201507-16
mlist
  • [oss-security] 20130515 CVE Request: Man in the middle on Gentoo Portage binary package installer
  • [oss-security] 20130515 Re: CVE Request: Man in the middle on Gentoo Portage binary package installer
xf portage-cve20132100-sec-bypass(84315)
Last major update 29-08-2017 - 01:33
Published 29-09-2014 - 22:55
Last modified 29-08-2017 - 01:33
Back to Top