Vulnerability Description
pulp-consumer-client 2.4.0 through 2.6.3 does not check the server's TLS certificate signatures when retrieving the server's public key upon registration.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Pulpproject | Pulp | 2.4.0 |
Related Weaknesses (CWE)
References
- http://cve.killedkenny.io/cve/CVE-2015-5263Third Party Advisory
- http://www.openwall.com/lists/oss-security/2015/09/24/4Mailing ListThird Party Advisory
- https://github.com/pulp/pulp/blob/aa432bf58497b5e3682333b1d5f5ae4f45788a61/clienThird Party Advisory
- https://github.com/pulp/pulp/commit/b542d7465f7e6e02e1ea1aec059ac607a65cefe7#difPatchThird Party Advisory
- http://cve.killedkenny.io/cve/CVE-2015-5263Third Party Advisory
- http://www.openwall.com/lists/oss-security/2015/09/24/4Mailing ListThird Party Advisory
- https://github.com/pulp/pulp/blob/aa432bf58497b5e3682333b1d5f5ae4f45788a61/clienThird Party Advisory
- https://github.com/pulp/pulp/commit/b542d7465f7e6e02e1ea1aec059ac607a65cefe7#difPatchThird Party Advisory
FAQ
What is CVE-2015-5263?
CVE-2015-5263 is a vulnerability with a CVSS score of 8.1 (HIGH). pulp-consumer-client 2.4.0 through 2.6.3 does not check the server's TLS certificate signatures when retrieving the server's public key upon registration.
How severe is CVE-2015-5263?
CVE-2015-5263 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-5263?
Check the references section above for vendor advisories and patch information. Affected products include: Pulpproject Pulp.