First published: Tue Oct 12 2010(Updated: )
Epiphany 2.28 and 2.29, when WebKit and LibSoup are used, unconditionally displays a closed-lock icon for any URL beginning with the https: substring, without any warning to the user, which allows man-in-the-middle attackers to spoof arbitrary https web sites via a crafted X.509 server certificate.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
GNOME Epiphany | =2.28 | |
GNOME Epiphany | =2.29 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-3312 is classified as a medium severity vulnerability due to its potential for man-in-the-middle attacks.
The exploit occurs when the affected versions of Epiphany unconditionally display a closed-lock icon for any HTTPS URL, misleading users into believing the connection is secure.
CVE-2010-3312 affects Epiphany versions 2.28 and 2.29.
To fix CVE-2010-3312, update to a version of Epiphany that is not vulnerable, such as newer releases beyond 2.29.
Users may unknowingly interact with spoofed HTTPS websites, exposing them to potential security risks.