Files
advisory-db/crates/openssl/RUSTSEC-2016-0001.toml
Sergey "Shnatsel" Davidoff 7797133c67 Add CVE mapping
2020-03-18 17:15:13 +01:00

25 lines
901 B
TOML

[advisory]
id = "RUSTSEC-2016-0001"
package = "openssl"
date = "2016-11-05"
keywords = ["ssl", "mitm"]
url = "https://github.com/sfackler/rust-openssl/releases/tag/v0.9.0"
title = "SSL/TLS MitM vulnerability due to insecure defaults"
description = """
All versions of rust-openssl prior to 0.9.0 contained numerous insecure defaults
including off-by-default certificate verification and no API to perform hostname
verification.
Unless configured correctly by a developer, these defaults could allow an attacker
to perform man-in-the-middle attacks.
The problem was addressed in newer versions by enabling certificate verification
by default and exposing APIs to perform hostname verification. Use the
`SslConnector` and `SslAcceptor` types to take advantage of these new features
(as opposed to the lower-level `SslContext` type).
"""
aliases = ["CVE-2016-10931"]
[versions]
patched = [">= 0.9.0"]