icon

We found results for “

CVE-2021-32066

Good to know:

icon

Date: July 31, 2021

An issue was discovered in Ruby through 2.6.7, 2.7.x through 2.7.3, and 3.x through 3.0.1. Net::IMAP does not raise an exception when StartTLS fails with an an unknown response, which might allow man-in-the-middle attackers to bypass the TLS protections by leveraging a network position between the client and the registry to block the StartTLS command, aka a "StartTLS stripping attack."

Language: Ruby

Severity Score

Severity Score

Weakness Type (CWE)

Inadequate Encryption Strength

CWE-326

Improper Handling of Exceptional Conditions

CWE-755

Top Fix

icon

Upgrade Version

Upgrade to version PactNet.OSX - no_fix;Ruby.Compass - 0.12.2.3;GallioBundle - no_fix;PactNet.Windows - no_fix;PactNet - 2.0.8-beta;ruby - 2.7.1;PactNet.Linux.x64 - no_fix;PactNet-Linux-x86 - no_fix;NougatUI - no_fix;logstash-binary - no_fix;PactNet-OSX - no_fix;PactNet-Linux-x64 - no_fix;jekyll-standalone - no_fix;PactNet.Linux.x86 - no_fix;PactNet-Windows - no_fix;org.jruby:jruby-stdlib:1.7.7

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): HIGH
Privileges Required (PR): NONE
User Interaction (UI): NONE
Scope (S): UNCHANGED
Confidentiality (C): HIGH
Integrity (I): HIGH
Availability (A): NONE

CVSS v2

Base Score:
Access Vector (AV): NETWORK
Access Complexity (AC): MEDIUM
Authentication (AU): NONE
Confidentiality (C): PARTIAL
Integrity (I): PARTIAL
Availability (A): NONE
Additional information:

Do you need more information?

Contact Us