CVE-2013-4073

Summary

CVECVE-2013-4073
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2013-08-18 02:52:00 UTC
Updated2023-11-07 02:16:00 UTC
DescriptionThe OpenSSL::SSL.verify_certificate_identity function in lib/openssl/ssl.rb in Ruby 1.8 before 1.8.7-p374, 1.9 before 1.9.3-p448, and 2.0 before 2.0.0-p247 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.

Risk And Classification

Problem Types: CWE-310

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Application Ruby-lang Ruby 1.8.6-26 All All All
Application Ruby-lang Ruby 1.8.7 All All All
Application Ruby-lang Ruby 1.8.7 p160 All All
Application Ruby-lang Ruby 1.8.7 p17 All All
Application Ruby-lang Ruby 1.8.7 p173 All All
Application Ruby-lang Ruby 1.8.7 p174 All All
Application Ruby-lang Ruby 1.8.7 p22 All All
Application Ruby-lang Ruby 1.8.7 p248 All All
Application Ruby-lang Ruby 1.8.7 p249 All All
Application Ruby-lang Ruby 1.8.7 p299 All All
Application Ruby-lang Ruby 1.8.7 p301 All All
Application Ruby-lang Ruby 1.8.7 p302 All All
Application Ruby-lang Ruby 1.8.7 p330 All All
Application Ruby-lang Ruby 1.8.7 p334 All All
Application Ruby-lang Ruby 1.8.7 p352 All All
Application Ruby-lang Ruby 1.8.7 p357 All All
Application Ruby-lang Ruby 1.8.7 p358 All All
Application Ruby-lang Ruby 1.8.7 p370 All All
Application Ruby-lang Ruby 1.8.7 p371 All All
Application Ruby-lang Ruby 1.8.7 p373 All All
Application Ruby-lang Ruby 1.8.7 p71 All All
Application Ruby-lang Ruby 1.8.7 p72 All All
Application Ruby-lang Ruby 1.8.7 preview1 All All
Application Ruby-lang Ruby 1.8.7 preview2 All All
Application Ruby-lang Ruby 1.8.7 preview3 All All
Application Ruby-lang Ruby 1.8.7 preview4 All All
Application Ruby-lang Ruby 1.9.3 All All All
Application Ruby-lang Ruby 1.9.3 p0 All All
Application Ruby-lang Ruby 1.9.3 p125 All All
Application Ruby-lang Ruby 1.9.3 p194 All All
Application Ruby-lang Ruby 1.9.3 p286 All All
Application Ruby-lang Ruby 1.9.3 p383 All All
Application Ruby-lang Ruby 1.9.3 p385 All All
Application Ruby-lang Ruby 1.9.3 p392 All All
Application Ruby-lang Ruby 1.9.3 p426 All All
Application Ruby-lang Ruby 1.9.3 p429 All All
Application Ruby-lang Ruby 2.0.0 p0 All All
Application Ruby-lang Ruby 2.0.0 p195 All All
Application Ruby-lang Ruby 2.0.0 preview1 All All
Application Ruby-lang Ruby 2.0.0 preview2 All All
Application Ruby-lang Ruby 2.0.0 rc1 All All
Application Ruby-lang Ruby 2.0.0 rc2 All All
Application Ruby-lang Ruby 1.8.6-26 All All All
Application Ruby-lang Ruby 1.8.7 All All All
Application Ruby-lang Ruby 1.8.7 p160 All All
Application Ruby-lang Ruby 1.8.7 p17 All All
Application Ruby-lang Ruby 1.8.7 p173 All All
Application Ruby-lang Ruby 1.8.7 p174 All All
Application Ruby-lang Ruby 1.8.7 p22 All All
Application Ruby-lang Ruby 1.8.7 p248 All All
Application Ruby-lang Ruby 1.8.7 p249 All All
Application Ruby-lang Ruby 1.8.7 p299 All All
Application Ruby-lang Ruby 1.8.7 p301 All All
Application Ruby-lang Ruby 1.8.7 p302 All All
Application Ruby-lang Ruby 1.8.7 p330 All All
Application Ruby-lang Ruby 1.8.7 p334 All All
Application Ruby-lang Ruby 1.8.7 p352 All All
Application Ruby-lang Ruby 1.8.7 p357 All All
Application Ruby-lang Ruby 1.8.7 p358 All All
Application Ruby-lang Ruby 1.8.7 p370 All All
Application Ruby-lang Ruby 1.8.7 p371 All All
Application Ruby-lang Ruby 1.8.7 p373 All All
Application Ruby-lang Ruby 1.8.7 p71 All All
Application Ruby-lang Ruby 1.8.7 p72 All All
Application Ruby-lang Ruby 1.8.7 preview1 All All
Application Ruby-lang Ruby 1.8.7 preview2 All All
Application Ruby-lang Ruby 1.8.7 preview3 All All
Application Ruby-lang Ruby 1.8.7 preview4 All All
Application Ruby-lang Ruby 1.9.3 All All All
Application Ruby-lang Ruby 1.9.3 p0 All All
Application Ruby-lang Ruby 1.9.3 p125 All All
Application Ruby-lang Ruby 1.9.3 p194 All All
Application Ruby-lang Ruby 1.9.3 p286 All All
Application Ruby-lang Ruby 1.9.3 p383 All All
Application Ruby-lang Ruby 1.9.3 p385 All All
Application Ruby-lang Ruby 1.9.3 p392 All All
Application Ruby-lang Ruby 1.9.3 p426 All All
Application Ruby-lang Ruby 1.9.3 p429 All All
Application Ruby-lang Ruby 2.0.0 p0 All All
Application Ruby-lang Ruby 2.0.0 p195 All All
Application Ruby-lang Ruby 2.0.0 preview1 All All
Application Ruby-lang Ruby 2.0.0 preview2 All All
Application Ruby-lang Ruby 2.0.0 rc1 All All
Application Ruby-lang Ruby 2.0.0 rc2 All All

References

ReferenceSourceLinkTags
About the security content of OS X Mavericks v10.9.2 and Security Update 2014-001 - Apple Support CONFIRM support.apple.com
Interworx Forum CONFIRM forums.interworx.com
USN-1902-1: Ruby vulnerability | Ubuntu UBUNTU www.ubuntu.com
Bug 979251 – CVE-2013-4073 ruby: hostname check bypassing vulnerability in SSL client CONFIRM bugzilla.redhat.com
openSUSE-SU-2013:1181-1: moderate: update for ruby19 SUSE lists.opensuse.org
APPLE-SA-2013-10-22-3 OS X Mavericks v10.9 APPLE lists.apple.com
Page Not Found - Interworx Forum forums.interworx.com
Debian -- Security Information -- DSA-2738-1 ruby1.9.1 DEBIAN www.debian.org
Red Hat Customer Portal REDHAT rhn.redhat.com
CVE-2013-4073 | Puppet CONFIRM puppet.com
Debian -- Security Information -- DSA-2809-1 ruby1.8 DEBIAN www.debian.org
Hostname check bypassing vulnerability in SSL client (CVE-2013-4073) CONFIRM www.ruby-lang.org Vendor Advisory
Red Hat Customer Portal REDHAT rhn.redhat.com
Red Hat Customer Portal REDHAT rhn.redhat.com
openSUSE-SU-2013:1186-1: moderate: ruby19 SUSE lists.opensuse.org
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report