CVE-2018-16395

Name
CVE-2018-16395
Description
An issue was discovered in the OpenSSL library in Ruby before 2.3.8, 2.4.x before 2.4.5, 2.5.x before 2.5.2, and 2.6.x before 2.6.0-preview3. When two OpenSSL::X509::Name objects are compared using ==, depending on the ordering, non-equal objects may return true. When the first argument is one character longer than the second, or the second argument contains a character that is one less than a character in the same position of the first argument, the result of == will be true. This could be leveraged to create an illegitimate certificate that may be accepted as legitimate and then used in signing or encryption operations.
NVD Severity
high
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Release Notes https://www.ruby-lang.org/en/news/2018/11/06/ruby-2-6-0-preview3-released/
Release Notes https://www.ruby-lang.org/en/news/2018/10/17/ruby-2-5-2-released/
Release Notes https://www.ruby-lang.org/en/news/2018/10/17/ruby-2-4-5-released/
Release Notes https://www.ruby-lang.org/en/news/2018/10/17/ruby-2-3-8-released/
Mitigation https://www.ruby-lang.org/en/news/2018/10/17/openssl-x509-name-equality-check-does-not-work-correctly-cve-2018-16395/
Third Party Advisory https://lists.debian.org/debian-lts-announce/2018/10/msg00020.html
Patch https://hackerone.com/reports/387250
Third Party Advisory https://www.debian.org/security/2018/dsa-4332
Third Party Advisory https://usn.ubuntu.com/3808-1/
Third Party Advisory http://www.securitytracker.com/id/1042105
Third Party Advisory https://access.redhat.com/errata/RHSA-2018:3738
Third Party Advisory https://access.redhat.com/errata/RHSA-2018:3731
Third Party Advisory https://access.redhat.com/errata/RHSA-2018:3730
Third Party Advisory https://access.redhat.com/errata/RHSA-2018:3729
Third Party Advisory https://security.netapp.com/advisory/ntap-20190221-0002/
Mailing List http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html
Third Party Advisory https://access.redhat.com/errata/RHSA-2019:1948
REDHAT https://access.redhat.com/errata/RHSA-2019:2565
MISC https://www.oracle.com/security-alerts/cpujan2020.html

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:* ruby >= 2.3.0 <= 2.3.7
cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:* ruby >= 2.4.0 <= 2.4.4
cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:* ruby >= 2.5.0 <= 2.5.1
cpe:2.3:a:ruby-lang:ruby:2.6.0:preview1:*:*:*:*:*:* ruby == None == 2.6.0
cpe:2.3:a:ruby-lang:openssl:*:*:*:*:*:ruby:*:* ruby-openssl >= None < 2.1.2

Vulnerable and fixed packages

Source package Branch Version Maintainer Status