rustsec-2017-0003
Vulnerability from osv_rustsec
Published
2017-03-15 12:00
Modified
2023-06-13 13:10
Summary
Hostname verification skipped when custom root certs used
Details
If custom root certificates were registered with a ClientBuilder, the
hostname of the target server would not be validated against its presented leaf
certificate.
This issue was fixed by properly configuring the trust evaluation logic to perform that check.
Severity
5.3 (Medium)
References
{
"affected": [
{
"database_specific": {
"categories": [],
"cvss": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"informational": null
},
"ecosystem_specific": {
"affected_functions": null,
"affects": {
"arch": [],
"functions": [],
"os": []
}
},
"package": {
"ecosystem": "crates.io",
"name": "security-framework",
"purl": "pkg:cargo/security-framework"
},
"ranges": [
{
"events": [
{
"introduced": "0.0.0-0"
},
{
"fixed": "0.1.12"
}
],
"type": "SEMVER"
}
],
"versions": []
}
],
"aliases": [
"CVE-2017-18588",
"GHSA-jqqr-c2r2-9cvr"
],
"database_specific": {
"license": "CC0-1.0"
},
"details": "If custom root certificates were registered with a `ClientBuilder`, the\nhostname of the target server would not be validated against its presented leaf\ncertificate.\n\nThis issue was fixed by properly configuring the trust evaluation logic to\nperform that check.",
"id": "RUSTSEC-2017-0003",
"modified": "2023-06-13T13:10:24Z",
"published": "2017-03-15T12:00:00Z",
"references": [
{
"type": "PACKAGE",
"url": "https://crates.io/crates/security-framework"
},
{
"type": "ADVISORY",
"url": "https://rustsec.org/advisories/RUSTSEC-2017-0003.html"
},
{
"type": "WEB",
"url": "https://github.com/sfackler/rust-security-framework/pull/27"
}
],
"related": [],
"severity": [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"type": "CVSS_V3"
}
],
"summary": "Hostname verification skipped when custom root certs used"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…