Vulnerability Details : CVE-2016-20011
libgrss through 0.7.0 fails to perform TLS certificate verification when downloading feeds, allowing remote attackers to manipulate the contents of feeds without detection. This occurs because of the default behavior of SoupSessionSync.
Exploit prediction scoring system (EPSS) score for CVE-2016-20011
Probability of exploitation activity in the next 30 days: 0.31%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 67 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2016-20011
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:P/A:N |
10.0
|
2.9
|
NIST |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2016-20011
-
The product does not validate, or incorrectly validates, a certificate.Assigned by: nvd@nist.gov (Primary)
References for CVE-2016-20011
-
https://gitlab.gnome.org/GNOME/libgrss/-/merge_requests/7.patch
Mailing List;Patch;Vendor Advisory
-
https://gitlab.gnome.org/GNOME/libgrss/-/issues/4
(CVE-2016-20011) No TLS certificate verification (#4) · Issues · GNOME / libgrss · GitLabIssue Tracking;Vendor Advisory
-
https://bugzilla.gnome.org/show_bug.cgi?id=772647
Bug 772647 – Perform TLS certificate verificationIssue Tracking;Vendor Advisory
Products affected by CVE-2016-20011
- cpe:2.3:a:gnome:libgrss:*:*:*:*:*:*:*:*