Vulnerability Database

289,599

Total vulnerabilities in the database

CVE-2018-16395

An issue was discovered in the OpenSSL library in Ruby before 2.3.8, 2.4.x before 2.4.5, 2.5.x before 2.5.2, and 2.6.x before 2.6.0-preview3. When two OpenSSL::X509::Name objects are compared using ==, depending on the ordering, non-equal objects may return true. When the first argument is one character longer than the second, or the second argument contains a character that is one less than a character in the same position of the first argument, the result of == will be true. This could be leveraged to create an illegitimate certificate that may be accepted as legitimate and then used in signing or encryption operations.

  • Published: Nov 16, 2018
  • Updated: Apr 13, 2023
  • CVE: CVE-2018-16395
  • Severity: Critical
  • Exploit:

CVSS v3:

  • Severity: Critical
  • Score: 9.8
  • AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v2:

  • Severity: High
  • Score: 7.5
  • AV:N/AC:L/Au:N/C:P/I:P/A:P

No CWE or OWASP classifications available.

Software From Fixed in
ruby-lang / ruby 2.6.0-preview1 2.6.0-preview1.x
ruby-lang / ruby 2.6.0-preview2 2.6.0-preview2.x
ruby-lang / ruby 2.3.0 2.3.7.x
ruby-lang / ruby 2.4.0 2.4.4.x
ruby-lang / ruby 2.5.0 2.5.1.x
ruby-lang / openssl - 2.1.2
canonical / ubuntu_linux 16.04 16.04.x
canonical / ubuntu_linux 14.04 14.04.x
canonical / ubuntu_linux 18.04 18.04.x
canonical / ubuntu_linux 18.10 18.10.x
debian / debian_linux 8.0 8.0.x
debian / debian_linux 9.0 9.0.x
redhat / enterprise_linux 7.4 7.4.x