Google Chrome before 18.0.1025.142 does not properly check X.509 certificates before use of a SPDY proxy, which might allow man-in-the-middle attackers to spoof servers or obtain sensitive information via a crafted certificate.
References
Link | Resource |
---|---|
http://googlechromereleases.blogspot.com/2012/03/stable-channel-release-and-beta-channel.html | Exploit Vendor Advisory |
http://code.google.com/p/chromium/issues/detail?id=116398 | Vendor Advisory |
http://osvdb.org/80739 | Broken Link |
http://secunia.com/advisories/48618 | Not Applicable |
http://www.securitytracker.com/id?1026877 | Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/52762 | Third Party Advisory VDB Entry |
http://secunia.com/advisories/48691 | Not Applicable |
http://secunia.com/advisories/48763 | Not Applicable |
https://exchange.xforce.ibmcloud.com/vulnerabilities/74411 | Third Party Advisory VDB Entry |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14849 | Third Party Advisory |
Configurations
Information
Published : 2012-03-30 15:55
Updated : 2020-04-14 08:13
NVD link : CVE-2011-3061
Mitre link : CVE-2011-3061
JSON object : View
CWE
CWE-295
Improper Certificate Validation
Products Affected
- chrome