We found results for “”
CVE-2021-32066
Good to know:
Date: July 31, 2021
An issue was discovered in Ruby through 2.6.7, 2.7.x through 2.7.3, and 3.x through 3.0.1. Net::IMAP does not raise an exception when StartTLS fails with an an unknown response, which might allow man-in-the-middle attackers to bypass the TLS protections by leveraging a network position between the client and the registry to block the StartTLS command, aka a "StartTLS stripping attack."
Language: Ruby
Severity Score
Related Resources (16)
Severity Score
Weakness Type (CWE)
Top Fix
Upgrade Version
Upgrade to version PactNet.OSX - no_fix;Ruby.Compass - 0.12.2.3;GallioBundle - no_fix;PactNet.Windows - no_fix;PactNet - 2.0.8-beta;ruby - 2.7.1;PactNet.Linux.x64 - no_fix;PactNet-Linux-x86 - no_fix;NougatUI - no_fix;logstash-binary - no_fix;PactNet-OSX - no_fix;PactNet-Linux-x64 - no_fix;jekyll-standalone - no_fix;PactNet.Linux.x86 - no_fix;PactNet-Windows - no_fix;org.jruby:jruby-stdlib:1.7.7
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | HIGH |
| Privileges Required (PR): | NONE |
| User Interaction (UI): | NONE |
| Scope (S): | UNCHANGED |
| Confidentiality (C): | HIGH |
| Integrity (I): | HIGH |
| Availability (A): | NONE |
CVSS v2
| Base Score: |
|
|---|---|
| Access Vector (AV): | NETWORK |
| Access Complexity (AC): | MEDIUM |
| Authentication (AU): | NONE |
| Confidentiality (C): | PARTIAL |
| Integrity (I): | PARTIAL |
| Availability (A): | NONE |
| Additional information: |
Vulnerabilities
Projects
Contact Us


