4.3

CVE-2012-2126

RubyGems before 1.8.23 does not verify an SSL certificate, which allows remote attackers to modify a gem during installation via a man-in-the-middle attack.

Data is provided by the National Vulnerability Database (NVD)
RubygemsRubygems Version <= 1.8.22
   RedhatOpenshift Version1.2.2 SwEditionenterprise
   CanonicalUbuntu Linux Version12.04 Update- Editionlts
RubygemsRubygems Version1.8.0
   RedhatOpenshift Version1.2.2 SwEditionenterprise
   CanonicalUbuntu Linux Version12.04 Update- Editionlts
RubygemsRubygems Version1.8.1
   RedhatOpenshift Version1.2.2 SwEditionenterprise
   CanonicalUbuntu Linux Version12.04 Update- Editionlts
RubygemsRubygems Version1.8.2
   RedhatOpenshift Version1.2.2 SwEditionenterprise
   CanonicalUbuntu Linux Version12.04 Update- Editionlts
RubygemsRubygems Version1.8.3
   RedhatOpenshift Version1.2.2 SwEditionenterprise
   CanonicalUbuntu Linux Version12.04 Update- Editionlts
RubygemsRubygems Version1.8.4
   RedhatOpenshift Version1.2.2 SwEditionenterprise
   CanonicalUbuntu Linux Version12.04 Update- Editionlts
RubygemsRubygems Version1.8.5
   RedhatOpenshift Version1.2.2 SwEditionenterprise
   CanonicalUbuntu Linux Version12.04 Update- Editionlts
RubygemsRubygems Version1.8.6
   RedhatOpenshift Version1.2.2 SwEditionenterprise
   CanonicalUbuntu Linux Version12.04 Update- Editionlts
RubygemsRubygems Version1.8.7
   RedhatOpenshift Version1.2.2 SwEditionenterprise
   CanonicalUbuntu Linux Version12.04 Update- Editionlts
RubygemsRubygems Version1.8.8
   RedhatOpenshift Version1.2.2 SwEditionenterprise
   CanonicalUbuntu Linux Version12.04 Update- Editionlts
RubygemsRubygems Version1.8.9
   RedhatOpenshift Version1.2.2 SwEditionenterprise
   CanonicalUbuntu Linux Version12.04 Update- Editionlts
RubygemsRubygems Version1.8.10
   RedhatOpenshift Version1.2.2 SwEditionenterprise
   CanonicalUbuntu Linux Version12.04 Update- Editionlts
RubygemsRubygems Version1.8.11
   RedhatOpenshift Version1.2.2 SwEditionenterprise
   CanonicalUbuntu Linux Version12.04 Update- Editionlts
RubygemsRubygems Version1.8.12
   RedhatOpenshift Version1.2.2 SwEditionenterprise
   CanonicalUbuntu Linux Version12.04 Update- Editionlts
RubygemsRubygems Version1.8.13
   RedhatOpenshift Version1.2.2 SwEditionenterprise
   CanonicalUbuntu Linux Version12.04 Update- Editionlts
RubygemsRubygems Version1.8.14
   RedhatOpenshift Version1.2.2 SwEditionenterprise
   CanonicalUbuntu Linux Version12.04 Update- Editionlts
RubygemsRubygems Version1.8.15
   RedhatOpenshift Version1.2.2 SwEditionenterprise
   CanonicalUbuntu Linux Version12.04 Update- Editionlts
RubygemsRubygems Version1.8.16
   RedhatOpenshift Version1.2.2 SwEditionenterprise
   CanonicalUbuntu Linux Version12.04 Update- Editionlts
RubygemsRubygems Version1.8.17
   RedhatOpenshift Version1.2.2 SwEditionenterprise
   CanonicalUbuntu Linux Version12.04 Update- Editionlts
RubygemsRubygems Version1.8.18
   RedhatOpenshift Version1.2.2 SwEditionenterprise
   CanonicalUbuntu Linux Version12.04 Update- Editionlts
RubygemsRubygems Version1.8.19
   RedhatOpenshift Version1.2.2 SwEditionenterprise
   CanonicalUbuntu Linux Version12.04 Update- Editionlts
RubygemsRubygems Version1.8.20
   RedhatOpenshift Version1.2.2 SwEditionenterprise
   CanonicalUbuntu Linux Version12.04 Update- Editionlts
RubygemsRubygems Version1.8.21
   RedhatOpenshift Version1.2.2 SwEditionenterprise
   CanonicalUbuntu Linux Version12.04 Update- Editionlts
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.27% 0.477
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 4.3 8.6 2.9
AV:N/AC:M/Au:N/C:N/I:P/A:N