6.8
CVSSv2

CVE-2010-2074

Published: 16/06/2010 Updated: 09/09/2010
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

istream.c in w3m 0.5.2 and possibly other versions, when ssl_verify_server is enabled, does not properly handle a '\0' character in a domain name in the (1) subject's Common Name or (2) Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle malicious users to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.

Vulnerable Product Search on Vulmon Subscribe to Product

w3m w3m 0.5.2

Vendor Advisories

Synopsis Moderate: w3m security update Type/Severity Security Advisory: Moderate Topic Updated w3m packages that fix one security issue are now available for RedHat Enterprise Linux 5The Red Hat Security Response Team has rated this update as having moderatesecurity impact A Common Vulnerability Scoring S ...
Debian Bug report logs - #587445 CVE-2010-2074 Package: w3m; Maintainer for w3m is Tatsuya Kinoshita <tats@debianorg>; Source for w3m is src:w3m (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Mon, 28 Jun 2010 17:33:02 UTC Severity: grave Tags: patch, security Fixed in version w3m/05 ...
The web browser w3m does not properly validate SSL/TLS certificates ...