First published: Sun Nov 04 2012(Updated: )
Lynx does not verify that the server's certificate is signed by a trusted certification authority, which allows man-in-the-middle attackers to spoof SSL servers via a crafted certificate, related to improper use of a certain GnuTLS function.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Lynx Lynx | ||
Ubuntu Linux | =10.04 | |
Ubuntu Linux | =11.10 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =12.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-5821 has a medium severity rating due to its potential for man-in-the-middle attacks.
To fix CVE-2012-5821, upgrade Lynx to the latest version that resolves the certificate verification issue.
CVE-2012-5821 affects all versions of Lynx prior to the patched releases that include proper certificate verification.
CVE-2012-5821 can enable man-in-the-middle attacks by allowing an attacker to spoof SSL servers with a malicious certificate.
CVE-2012-5821 primarily affects Lynx on various Ubuntu Linux versions, including 10.04, 11.10, 12.04, and 12.10.