Google Chrome before 18.0.1025.142 does not properly check X.509 certificates before use of a SPDY proxy, which might allow man-in-the-middle attackers to spoof servers or obtain sensitive information via a crafted certificate.
The product does not validate, or incorrectly validates, a certificate.
Link | Tags |
---|---|
http://www.securitytracker.com/id?1026877 | third party advisory vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/74411 | third party advisory vdb entry |
http://secunia.com/advisories/48618 | third party advisory not applicable |
http://secunia.com/advisories/48691 | third party advisory not applicable |
http://osvdb.org/80739 | vdb entry broken link |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14849 | signature third party advisory vdb entry |
http://googlechromereleases.blogspot.com/2012/03/stable-channel-release-and-beta-channel.html | vendor advisory exploit |
http://www.securityfocus.com/bid/52762 | third party advisory vdb entry |
http://code.google.com/p/chromium/issues/detail?id=116398 | vendor advisory |
http://secunia.com/advisories/48763 | third party advisory not applicable |