ID CVE-2010-3312
Summary Epiphany 2.28 and 2.29, when WebKit and LibSoup are used, unconditionally displays a closed-lock icon for any URL beginning with the https: substring, without any warning to the user, which allows man-in-the-middle attackers to spoof arbitrary https web sites via a crafted X.509 server certificate.
References
Vulnerable Configurations
  • cpe:2.3:a:gnome:epiphany:2.28:*:*:*:*:*:*:*
    cpe:2.3:a:gnome:epiphany:2.28:*:*:*:*:*:*:*
  • cpe:2.3:a:gnome:epiphany:2.29:*:*:*:*:*:*:*
    cpe:2.3:a:gnome:epiphany:2.29:*:*:*:*:*:*:*
CVSS
Base: 5.8 (as of 17-02-2011 - 06:58)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL NONE
cvss-vector via4 AV:N/AC:M/Au:N/C:P/I:P/A:N
refmap via4
confirm
misc http://blog.fefe.de/?ts=b26ca29d
mlist
  • [oss-security] 20100917 CVE request: epiphany not checking ssl certs
  • [oss-security] 20100917 Re: CVE request: epiphany not checking ssl certs
  • [oss-security] 20100920 Re: CVE request: epiphany not checking ssl certs
  • [oss-security] 20100921 Re: CVE request: epiphany not checking ssl certs
secunia 43068
suse
  • SUSE-SR:2010:023
  • SUSE-SR:2011:002
vupen ADV-2011-0212
Last major update 17-02-2011 - 06:58
Published 14-10-2010 - 05:58
Back to Top