Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2014-3230
Analyzed
More InfoOfficial Page
Source-secalert@redhat.com
View Known Exploited Vulnerability (KEV) details
Published At-28 Jan, 2020 | 16:15
Updated At-06 Feb, 2020 | 15:23

The libwww-perl LWP::Protocol::https module 6.04 through 6.06 for Perl, when using IO::Socket::SSL as the SSL socket class, allows attackers to disable server certificate validation via the (1) HTTPS_CA_DIR or (2) HTTPS_CA_FILE environment variable.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.15.9MEDIUM
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
Primary2.04.3MEDIUM
AV:N/AC:M/Au:N/C:N/I:P/A:N
CPE Matches

lwp\
lwp\
>>\>>protocol\
cpe:2.3:a:lwp\:\:protocol\:\:https_project:lwp\:\:protocol\:\:https:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-295Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://www.openwall.com/lists/oss-security/2014/05/02/8secalert@redhat.com
Mailing List
Third Party Advisory
http://www.openwall.com/lists/oss-security/2014/05/04/1secalert@redhat.com
Mailing List
Patch
Third Party Advisory
http://www.openwall.com/lists/oss-security/2014/05/06/8secalert@redhat.com
Mailing List
Third Party Advisory
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=746579secalert@redhat.com
Exploit
Mailing List
Patch
Third Party Advisory
https://github.com/libwww-perl/lwp-protocol-https/pull/14secalert@redhat.com
Broken Link
Change History
0Changes found

Details not found