CVE-2020-13645

In GNOME glib-networking through 2.64.2, the implementation of GTlsClientConnection skips hostname verification of the server's TLS certificate if the application fails to specify the expected server identity. This is in contrast to its intended documented behavior, to fail the certificate verification. Applications that fail to provide the server identity, including Balsa before 2.5.11 and 2.6.x before 2.6.1, accept a TLS certificate if the certificate is valid for any host.
References
Link Resource
https://gitlab.gnome.org/GNOME/balsa/-/issues/34 Exploit Vendor Advisory
https://gitlab.gnome.org/GNOME/glib-networking/-/issues/135 Exploit Vendor Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HLEX2IP62SU6WJ4SK3U766XGLQK3J62O/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LRCUM22YEWWKNMN2BP5LTVDM5P4VWIXS/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TQEQJQ4XFMFCFJTEXKL2ZO3UELBPCKSK/
https://security.gentoo.org/glsa/202007-50 Third Party Advisory
https://security.netapp.com/advisory/ntap-20200608-0004/ Third Party Advisory
https://usn.ubuntu.com/4405-1/ Third Party Advisory
https://gitlab.gnome.org/GNOME/balsa/-/issues/34 Exploit Vendor Advisory
https://gitlab.gnome.org/GNOME/glib-networking/-/issues/135 Exploit Vendor Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HLEX2IP62SU6WJ4SK3U766XGLQK3J62O/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LRCUM22YEWWKNMN2BP5LTVDM5P4VWIXS/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TQEQJQ4XFMFCFJTEXKL2ZO3UELBPCKSK/
https://security.gentoo.org/glsa/202007-50 Third Party Advisory
https://security.netapp.com/advisory/ntap-20200608-0004/ Third Party Advisory
https://usn.ubuntu.com/4405-1/ Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:gnome:balsa:*:*:*:*:*:*:*:*
cpe:2.3:a:gnome:balsa:2.6.0:*:*:*:*:*:*:*
cpe:2.3:a:gnome:glib-networking:*:*:*:*:*:*:*:*
cpe:2.3:a:gnome:glib-networking:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
cpe:2.3:o:broadcom:fabric_operating_system:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2020-05-28 12:15

Updated : 2024-11-21 05:01


NVD link : CVE-2020-13645

Mitre link : CVE-2020-13645

CVE.ORG link : CVE-2020-13645


JSON object : View

Products Affected

fedoraproject

  • fedora

netapp

  • cloud_backup

gnome

  • glib-networking
  • balsa

broadcom

  • fabric_operating_system

canonical

  • ubuntu_linux
CWE
CWE-295

Improper Certificate Validation