verify_certificate_identity in the OpenSSL extension in Ruby before 2.0.0 patchlevel 645, 2.1.x before 2.1.6, and 2.2.x before 2.2.2 does not properly validate hostnames, which allows remote attackers to spoof servers via vectors related to (1) multiple wildcards, (1) wildcards in IDNA names, (3) case sensitivity, and (4) non-ASCII characters.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-224-1 | ruby1.8 security update |
Debian DLA |
DLA-235-1 | ruby1.9.1 security update |
Debian DSA |
DSA-3245-1 | ruby1.8 security update |
Debian DSA |
DSA-3246-1 | ruby1.9.1 security update |
Debian DSA |
DSA-3247-1 | ruby2.1 security update |
EUVD |
EUVD-2015-1964 | verify_certificate_identity in the OpenSSL extension in Ruby before 2.0.0 patchlevel 645, 2.1.x before 2.1.6, and 2.2.x before 2.2.2 does not properly validate hostnames, which allows remote attackers to spoof servers via vectors related to (1) multiple wildcards, (1) wildcards in IDNA names, (3) case sensitivity, and (4) non-ASCII characters. |
Ubuntu USN |
USN-3365-1 | Ruby vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Sat, 12 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T04:54:16.307Z
Reserved: 2015-02-17T00:00:00
Link: CVE-2015-1855
No data.
Status : Modified
Published: 2019-11-29T21:15:10.807
Modified: 2024-11-21T02:26:16.630
Link: CVE-2015-1855
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN