mirror of
https://github.com/OMGeeky/advisory-db.git
synced 2026-01-25 04:40:44 +01:00
25 lines
901 B
TOML
25 lines
901 B
TOML
[advisory]
|
|
id = "RUSTSEC-2016-0001"
|
|
package = "openssl"
|
|
date = "2016-11-05"
|
|
keywords = ["ssl", "mitm"]
|
|
url = "https://github.com/sfackler/rust-openssl/releases/tag/v0.9.0"
|
|
title = "SSL/TLS MitM vulnerability due to insecure defaults"
|
|
description = """
|
|
All versions of rust-openssl prior to 0.9.0 contained numerous insecure defaults
|
|
including off-by-default certificate verification and no API to perform hostname
|
|
verification.
|
|
|
|
Unless configured correctly by a developer, these defaults could allow an attacker
|
|
to perform man-in-the-middle attacks.
|
|
|
|
The problem was addressed in newer versions by enabling certificate verification
|
|
by default and exposing APIs to perform hostname verification. Use the
|
|
`SslConnector` and `SslAcceptor` types to take advantage of these new features
|
|
(as opposed to the lower-level `SslContext` type).
|
|
"""
|
|
aliases = ["CVE-2016-10931"]
|
|
|
|
[versions]
|
|
patched = [">= 0.9.0"]
|