Sponsored Content
Special Forums Cybersecurity Security Advisories (RSS) Ubuntu: 967-1: w3m vulnerability Post 302443680 by Linux Bot on Monday 9th of August 2010 09:00:02 PM
Old 08-09-2010
Ubuntu: 967-1: w3m vulnerability

LinuxSecurity.com: Ludwig Nussel discovered w3m does not properly handle SSL/TLScertificates with NULL characters in the certificate name. Anattacker could exploit this to perform a man in the middleattack to view sensitive information or alter encryptedcommunications. (CVE-2010-2074) [More...]

More...
This User Gave Thanks to Linux Bot For This Post:
 
SSL_get_peer_certificate(3)					      OpenSSL					       SSL_get_peer_certificate(3)

NAME
SSL_get_peer_certificate - get the X509 certificate of the peer LIBRARY
libcrypto, -lcrypto SYNOPSIS
#include <openssl/ssl.h> X509 *SSL_get_peer_certificate(const SSL *ssl); DESCRIPTION
SSL_get_peer_certificate() returns a pointer to the X509 certificate the peer presented. If the peer did not present a certificate, NULL is returned. NOTES
Due to the protocol definition, a TLS/SSL server will always send a certificate, if present. A client will only send a certificate when explicitly requested to do so by the server (see SSL_CTX_set_verify(3)). If an anonymous cipher is used, no certificates are sent. That a certificate is returned does not indicate information about the verification state, use SSL_get_verify_result(3) to check the verification state. The reference count of the X509 object is incremented by one, so that it will not be destroyed when the session containing the peer certificate is freed. The X509 object must be explicitly freed using X509_free(). RETURN VALUES
The following return values can occur: NULL No certificate was presented by the peer or no connection was established. Pointer to an X509 certificate The return value points to the certificate presented by the peer. SEE ALSO
ssl(3), SSL_get_verify_result(3), SSL_CTX_set_verify(3) 1.0.1i 2009-07-20 SSL_get_peer_certificate(3)
All times are GMT -4. The time now is 05:02 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy