CVE-2012-5821

Lynx does not verify that the server's certificate is signed by a trusted certification authority, which allows man-in-the-middle attackers to spoof SSL servers via a crafted certificate, related to improper use of a certain GnuTLS function.
Configurations

Configuration 1 (hide)

cpe:2.3:a:lynx:lynx:-:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*

History

09 Feb 2024, 03:18

Type Values Removed Values Added
References () http://www.mandriva.com/security/advisories?name=MDVSA-2013:101 - () http://www.mandriva.com/security/advisories?name=MDVSA-2013:101 - Broken Link
References () http://www.ubuntu.com/usn/USN-1642-1 - () http://www.ubuntu.com/usn/USN-1642-1 - Third Party Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/79930 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/79930 - Third Party Advisory, VDB Entry
References () https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0351 - () https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0351 - Third Party Advisory
CVSS v2 : 5.8
v3 : unknown
v2 : 5.8
v3 : 5.9
CPE cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
CWE CWE-310 CWE-295
First Time Canonical ubuntu Linux
Canonical

Information

Published : 2012-11-04 22:55

Updated : 2024-02-09 03:18


NVD link : CVE-2012-5821

Mitre link : CVE-2012-5821

CVE.ORG link : CVE-2012-5821


JSON object : View

Products Affected

canonical

  • ubuntu_linux

lynx

  • lynx
CWE
CWE-295

Improper Certificate Validation