CVE-2018-16395

Summary

CVECVE-2018-16395
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2018-11-16 18:29:00 UTC
Updated2019-10-03 00:03:00 UTC
DescriptionAn issue was discovered in the OpenSSL library in Ruby before 2.3.8, 2.4.x before 2.4.5, 2.5.x before 2.5.2, and 2.6.x before 2.6.0-preview3. When two OpenSSL::X509::Name objects are compared using ==, depending on the ordering, non-equal objects may return true. When the first argument is one character longer than the second, or the second argument contains a character that is one less than a character in the same position of the first argument, the result of == will be true. This could be leveraged to create an illegitimate certificate that may be accepted as legitimate and then used in signing or encryption operations.

Risk And Classification

Problem Types: NVD-CWE-noinfo

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Operating System Canonical Ubuntu Linux 14.04 All All All
Operating System Canonical Ubuntu Linux 16.04 All All All
Operating System Canonical Ubuntu Linux 18.04 All All All
Operating System Canonical Ubuntu Linux 18.10 All All All
Operating System Canonical Ubuntu Linux 14.04 All All All
Operating System Canonical Ubuntu Linux 16.04 All All All
Operating System Canonical Ubuntu Linux 18.04 All All All
Operating System Canonical Ubuntu Linux 18.10 All All All
Operating System Debian Debian Linux 8.0 All All All
Operating System Debian Debian Linux 9.0 All All All
Operating System Debian Debian Linux 8.0 All All All
Operating System Debian Debian Linux 9.0 All All All
Operating System Redhat Enterprise Linux 7.4 All All All
Operating System Redhat Enterprise Linux 7.4 All All All
Application Ruby-lang Openssl All All All All
Application Ruby-lang Openssl All All All All
Application Ruby-lang Ruby 2.6.0 preview1 All All
Application Ruby-lang Ruby 2.6.0 preview2 All All
Application Ruby-lang Ruby 2.6.0 preview1 All All
Application Ruby-lang Ruby 2.6.0 preview2 All All
Application Ruby-lang Ruby All All All All
Application Ruby-lang Ruby All All All All
Application Ruby-lang Ruby All All All All

References

ReferenceSourceLinkTags
Red Hat Customer Portal REDHAT access.redhat.com Third Party Advisory
Debian -- Security Information -- DSA-4332-1 ruby2.3 DEBIAN www.debian.org Third Party Advisory
USN-3808-1: Ruby vulnerabilities | Ubuntu security notices UBUNTU usn.ubuntu.com Third Party Advisory
Red Hat Customer Portal REDHAT access.redhat.com Third Party Advisory
Red Hat Customer Portal REDHAT access.redhat.com
Red Hat Customer Portal REDHAT access.redhat.com Third Party Advisory
Ruby 2.5.2 Released CONFIRM www.ruby-lang.org Release Notes, Vendor Advisory
[SECURITY] [DLA 1558-1] ruby2.1 security update MLIST lists.debian.org Third Party Advisory
Ruby 2.3.8 Released CONFIRM www.ruby-lang.org Release Notes, Vendor Advisory
Ruby OpenSSL::X509::Name() May Fail to Prevent Remote Users from Bypassing Security Restrictions on the Target System - SecurityTracker SECTRACK www.securitytracker.com Third Party Advisory, VDB Entry
Red Hat Customer Portal REDHAT access.redhat.com Third Party Advisory
Ruby 2.4.5 Released CONFIRM www.ruby-lang.org Release Notes, Vendor Advisory
CVE-2018-16395: OpenSSL::X509::Name equality check does not work correctly CONFIRM www.ruby-lang.org Mitigation, Vendor Advisory
HackerOne MISC hackerone.com Patch, Third Party Advisory
November 2018 Ruby Vulnerabilities in NetApp Products | NetApp Product Security CONFIRM security.netapp.com Third Party Advisory
[security-announce] openSUSE-SU-2019:1771-1: important: Security update SUSE lists.opensuse.org Mailing List, Third Party Advisory
Oracle Critical Patch Update Advisory - January 2020 MISC www.oracle.com
Red Hat Customer Portal REDHAT access.redhat.com Third Party Advisory
Ruby 2.6.0-preview3 Released CONFIRM www.ruby-lang.org Release Notes, Vendor Advisory
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis

Legacy QID Mappings

  • 296091 Oracle Solaris 11.4 Support Repository Update (SRU) 6.1.4 Missing (CPUJAN2019)
  • 500611 Alpine Linux Security Update for ruby
  • 504371 Alpine Linux Security Update for ruby
  • 690286 Free Berkeley Software Distribution (FreeBSD) Security Update for ruby (afc60484-0652-440e-b01a-5ef814747f06)
  • 900014 CBL-Mariner Linux Security Update for openssl 1.1.1g
  • 903209 Common Base Linux Mariner (CBL-Mariner) Security Update for Open Secure Sockets Layer (OpenSSL) (2687)
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report