#VU29491 Improper validation of certificate with host mismatch in glib-networking - CVE-2020-13645
Published: July 3, 2020
glib-networking
Gnome Development Team
Description
The vulnerability allows a remote attacker to perform MitM attack.
The vulnerability exists in GNOME glib-networking due to implementation of GTlsClientConnection skips hostname verification of
the server's TLS certificate if the application fails to specify the
expected server identity. A remote attacker can perform a Man-in-he-Middle (MitM) attack and gain access to sensitive information.
Remediation
External links
- https://gitlab.gnome.org/GNOME/balsa/-/issues/34
- https://gitlab.gnome.org/GNOME/glib-networking/-/issues/135
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HLEX2IP62SU6WJ4SK3U766XGLQK3J62O/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TQEQJQ4XFMFCFJTEXKL2ZO3UELBPCKSK/
- https://security.netapp.com/advisory/ntap-20200608-0004/