CVE-2017-10789
Summary
| CVE | CVE-2017-10789 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2017-07-01 18:29:00 UTC |
| Updated | 2019-10-03 00:03:00 UTC |
| Description | The DBD::mysql module through 4.043 for Perl uses the mysql_ssl=1 setting to mean that SSL is optional (even though this setting's documentation has a "your communication with the server will be encrypted" statement), which allows man-in-the-middle attackers to spoof servers via a cleartext-downgrade attack, a related issue to CVE-2015-3152. |
Risk And Classification
Problem Types: NVD-CWE-noinfo
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Dbd-mysql Project | Dbd-mysql | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| CVE-2017-10789: mysql_ssl=1 does not enforce encryption · Issue #140 · perl5-dbi/DBD-mysql · GitHub | MISC | github.com | |
| Perl DBD::mysql Module CVE-2017-10789 Man in the Middle Security Bypass Vulnerability | BID | www.securityfocus.com | Third Party Advisory, VDB Entry |
| Improve SSL settings, reflect changes for BACKRONYM and Riddle vulnerabilities, enforce SSL encryption when mysql_ssl=1 is set by pali · Pull Request #114 · perl5-dbi/DBD-mysql · GitHub | MISC | github.com | Third Party Advisory |
| Handle SSL/TLS correctly · Issue #110 · perl5-dbi/DBD-mysql · GitHub | MISC | github.com | Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 670248 EulerOS Security Update for perl-DBD-MySQL (EulerOS-SA-2021-1828)