CVE-2020-15136

Source
https://nvd.nist.gov/vuln/detail/CVE-2020-15136
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-15136.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2020-15136
Aliases
Related
Published
2020-08-06T23:15:11Z
Modified
2024-09-11T06:12:58.854934Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N CVSS Calculator
Summary
[none]
Details

In ectd before versions 3.4.10 and 3.3.23, gateway TLS authentication is only applied to endpoints detected in DNS SRV records. When starting a gateway, TLS authentication will only be attempted on endpoints identified in DNS SRV records for a given domain, which occurs in the discoverEndpoints function. No authentication is performed against endpoints provided in the --endpoints flag. This has been fixed in versions 3.4.10 and 3.3.23 with improved documentation and deprecation of the functionality.

References

Affected packages

Debian:11 / etcd

Package

Name
etcd
Purl
pkg:deb/debian/etcd?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.3.25+dfsg-5

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / etcd

Package

Name
etcd
Purl
pkg:deb/debian/etcd?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.3.25+dfsg-5

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / etcd

Package

Name
etcd
Purl
pkg:deb/debian/etcd?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.3.25+dfsg-5

Ecosystem specific

{
    "urgency": "not yet assigned"
}