Ubuntu: 967-1: w3m vulnerability


 
Thread Tools Search this Thread
Special Forums Cybersecurity Security Advisories (RSS) Ubuntu: 967-1: w3m vulnerability
# 1  
Old 08-09-2010
Ubuntu: 967-1: w3m vulnerability

LinuxSecurity.com: Ludwig Nussel discovered w3m does not properly handle SSL/TLScertificates with NULL characters in the certificate name. Anattacker could exploit this to perform a man in the middleattack to view sensitive information or alter encryptedcommunications. (CVE-2010-2074) [More...]

More...
This User Gave Thanks to Linux Bot For This Post:
Login or Register to Ask a Question

Previous Thread | Next Thread
Login or Register to Ask a Question
SSL_get_peer_certificate(3)					      OpenSSL					       SSL_get_peer_certificate(3)

NAME
SSL_get_peer_certificate - get the X509 certificate of the peer SYNOPSIS
#include <openssl/ssl.h> X509 *SSL_get_peer_certificate(SSL *ssl); DESCRIPTION
SSL_get_peer_certificate() returns a pointer to the X509 certificate the peer presented. If the peer did not present a certificate, NULL is returned. NOTES
Due to the protocol definition, a TLS/SSL server will always send a certificate, if present. A client will only send a certificate when explicitly requested to do so by the server (see SSL_CTX_set_verify(3)). If an anonymous cipher is used, no certificates are sent. That a certificate is returned does not indicate information about the verification state, use SSL_get_verify_result(3) to check the veri- fication state. The reference count of the X509 object is incremented by one, so that it will not be destroyed when the session containing the peer cer- tificate is freed. The X509 object must be explicitly freed using X509_free(). RETURN VALUES
The following return values can occur: NULL No certificate was presented by the peer or no connection was established. Pointer to an X509 certificate The return value points to the certificate presented by the peer. SEE ALSO
ssl(3), SSL_get_verify_result(3), SSL_CTX_set_verify(3) 0.9.7d 2002-12-01 SSL_get_peer_certificate(3)