CVE-2015-1855

Public on 2015-05-27
Modified on 2024-04-22
Description
It was discovered that the Ruby OpenSSL extension was overly permissive when verifying host names against X.509 certificate names with wildcards. This could cause Ruby TLS/SSL clients to accept certain certificates as valid, which is a violation of the RFC 6125 recommendations.
Severity
Medium severity
Medium
See what this means
CVSS v3 Base Score
5.9
See breakdown

Affected Packages

Platform Package Release Date Advisory Status
Amazon Linux 1 ruby No Fix Planned
Amazon Linux 2 - Core ruby Not Affected
Amazon Linux 1 ruby18 2015-05-27 ALAS-2015-529 Fixed
Amazon Linux 1 ruby19 2015-05-27 ALAS-2015-530 Fixed
Amazon Linux 1 ruby20 2015-05-27 ALAS-2015-531 Fixed
Amazon Linux 1 ruby21 2015-05-27 ALAS-2015-532 Fixed
Amazon Linux 1 ruby22 2015-05-27 ALAS-2015-533 Fixed
Amazon Linux 1 ruby23 No Fix Planned
Amazon Linux 1 ruby24 No Fix Planned
Amazon Linux 2023 ruby3.2 Not Affected

CVSS Scores

Score Type Score Vector
Amazon Linux CVSSv3 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
NVD CVSSv2 4.3 AV:N/AC:M/Au:N/C:N/I:P/A:N
NVD CVSSv3 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N