Vulnerability Description
RubyGems before 1.8.23 does not verify an SSL certificate, which allows remote attackers to modify a gem during installation via a man-in-the-middle attack.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Rubygems | Rubygems | <= 1.8.22 |
| Redhat | Openshift | 1.2.2 |
| Canonical | Ubuntu Linux | 12.04 |
Related Weaknesses (CWE)
References
- http://rhn.redhat.com/errata/RHSA-2013-1203.html
- http://rhn.redhat.com/errata/RHSA-2013-1441.html
- http://rhn.redhat.com/errata/RHSA-2013-1852.html
- http://secunia.com/advisories/55381
- http://www.openwall.com/lists/oss-security/2012/04/20/24
- http://www.ubuntu.com/usn/USN-1582-1/
- https://bugzilla.redhat.com/show_bug.cgi?id=814718
- https://github.com/rubygems/rubygems/blob/1.8/History.txtPatchVendor Advisory
- http://rhn.redhat.com/errata/RHSA-2013-1203.html
- http://rhn.redhat.com/errata/RHSA-2013-1441.html
- http://rhn.redhat.com/errata/RHSA-2013-1852.html
- http://secunia.com/advisories/55381
- http://www.openwall.com/lists/oss-security/2012/04/20/24
- http://www.ubuntu.com/usn/USN-1582-1/
- https://bugzilla.redhat.com/show_bug.cgi?id=814718
FAQ
What is CVE-2012-2126?
CVE-2012-2126 is a vulnerability with a CVSS score of 4.3 (MEDIUM). RubyGems before 1.8.23 does not verify an SSL certificate, which allows remote attackers to modify a gem during installation via a man-in-the-middle attack.
How severe is CVE-2012-2126?
CVE-2012-2126 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2012-2126?
Check the references section above for vendor advisories and patch information. Affected products include: Rubygems Rubygems, Redhat Openshift, Canonical Ubuntu Linux.