Security Advisories (1)
CVE-2009-3024 (2009-08-31)

The verify_hostname_of_cert function in the certificate checking feature in IO-Socket-SSL (IO::Socket::SSL) 1.14 through 1.25 only matches the prefix of a hostname when no wildcard is used, which allows remote attackers to bypass the hostname check for a certificate.

Changes for version 1.983 - 2014-05-03

  • fix public suffix handling: ajax.googleapis.com should be ok even if googleapis.com is in public suffix list (e.g. check one level less) #95317, thanks to purification[AT]ukr[DOT]net
  • usable_ca.t - update fingerprints after heartbleed attack
  • usable_ca.t - make sure we have usable CA for tested hosts in CA store

Modules

SSL sockets with IO::Socket interface
SSL interception (man in the middle)
provide access to Mozillas list of effective TLD names
loading, storing, creating certificates and keys

Provides

in lib/IO/Socket/SSL.pm
in lib/IO/Socket/SSL.pm
in lib/IO/Socket/SSL.pm