Vulnerability Name:

CVE-2010-3312 (CCN-62640)

Assigned:2010-01-11
Published:2010-01-11
Updated:2011-02-17
Summary:Epiphany 2.28 and 2.29, when WebKit and LibSoup are used, unconditionally displays a closed-lock icon for any URL beginning with the https: substring, without any warning to the user, which allows man-in-the-middle attackers to spoof arbitrary https web sites via a crafted X.509 server certificate.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:5.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N)
4.3 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): None
4.3 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N)
3.2 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Access
References:Source: MISC
Type: UNKNOWN
http://blog.fefe.de/?ts=b26ca29d

Source: CCN
Type: Debian Bug report logs - #564690
epiphany-browser - Does not longer check certificates

Source: CONFIRM
Type: UNKNOWN
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=564690

Source: CONFIRM
Type: UNKNOWN
http://bugzilla-attachments.gnome.org/attachment.cgi?id=154330

Source: MITRE
Type: CNA
CVE-2010-3312

Source: SUSE
Type: UNKNOWN
SUSE-SR:2010:023

Source: SUSE
Type: UNKNOWN
SUSE-SR:2011:002

Source: CCN
Type: Epiphany Web page
Epiphany: The web browser for the GNOME desktop

Source: SECUNIA
Type: UNKNOWN
43068

Source: MLIST
Type: UNKNOWN
[oss-security] 20100917 Re: CVE request: epiphany not checking ssl certs

Source: MLIST
Type: UNKNOWN
[oss-security] 20100917 Re: CVE request: epiphany not checking ssl certs

Source: MLIST
Type: UNKNOWN
[oss-security] 20100917 Re: CVE request: epiphany not checking ssl certs

Source: MLIST
Type: UNKNOWN
[oss-security] 20100917 CVE request: epiphany not checking ssl certs

Source: MLIST
Type: UNKNOWN
[oss-security] 20100917 Re: CVE request: epiphany not checking ssl certs

Source: MLIST
Type: UNKNOWN
[oss-security] 20100920 Re: CVE request: epiphany not checking ssl certs

Source: MLIST
Type: UNKNOWN
[oss-security] 20100921 Re: CVE request: epiphany not checking ssl certs

Source: CCN
Type: OSVDB ID: 68628
Midori X.509 Certificate Verification MiTM Arbitrary HTTPS Site Spoofing Weakness

Source: CCN
Type: OSVDB ID: 68629
Epiphany HTTPS URL Closed-lock Icon Display MiTM Arbitrary HTTPS Site Spoofing Weakness

Source: VUPEN
Type: UNKNOWN
ADV-2011-0212

Source: CONFIRM
Type: UNKNOWN
https://bugzilla.gnome.org/show_bug.cgi?id=600663

Source: XF
Type: UNKNOWN
epiphany-x509-spoofing(62640)

Source: SUSE
Type: SUSE-SR:2010:023
SUSE Security Summary Report

Source: SUSE
Type: SUSE-SR:2011:002
SUSE Security Summary Report

Vulnerable Configuration:Configuration 1:
  • cpe:/a:gnome:epiphany:2.28:*:*:*:*:*:*:*
  • OR cpe:/a:gnome:epiphany:2.29:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:gnome:epiphany:2.28:*:*:*:*:*:*:*
  • OR cpe:/a:gnome:epiphany:2.29:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20103312
    V
    CVE-2010-3312
    2015-11-16
    oval:com.ubuntu.precise:def:20103312000
    V
    CVE-2010-3312 on Ubuntu 12.04 LTS (precise) - low.
    2010-10-14
    BACK
    gnome epiphany 2.28
    gnome epiphany 2.29
    gnome epiphany 2.28
    gnome epiphany 2.29