Bug ID | 1082814 |
---|---|
Summary | VUL-0: CVE-2012-6709 elinks: Does not properly verify SSL certificates |
Classification | openSUSE |
Product | openSUSE Distribution |
Version | Leap 42.3 |
Hardware | Other |
URL | https://smash.suse.de/issue/200756/ |
OS | Other |
Status | NEW |
Severity | Normal |
Priority | P5 - None |
Component | Security |
Assignee | puzel@suse.com |
Reporter | jsegitz@suse.com |
QA Contact | security-team@suse.de |
Found By | Security Response Team |
Blocker | --- |
From Vincent Danen A Debian bug report [1] indicated that Links does not properly verify SSL certificates. If you visit a web site with an expired SSL certificate, Links will only display "SSL error" without any indication as to what the error was. This, in and of itself, is not a flaw however when testing, I found that when you go to a site with a valid SSL certificate, but for a different hostname (for example, if you go to https://alias.foo.com which might be a CNAME or a proxy for https://foo.com) Links will connect without any errors or warnings. Doing the same in a browser like Google Chrome, however, reports "You attempted to reach alias.foo.com, but instead you actually reached a server identifying itself as foo.com." and allows you to either proceed or not, before loading the site. elinks https://wrong.host.badssl.com/ opens without warning References: [1] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=694658 https://bugzilla.redhat.com/show_bug.cgi?id=881399 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-6709 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=694658