CVE-2011-0633

NameCVE-2011-0633
DescriptionThe Net::HTTPS module in libwww-perl (LWP) before 6.00, as used in WWW::Mechanize, LWP::UserAgent, and other products, when running in environments that do not set the If-SSL-Cert-Subject header, does not enable full validation of SSL certificates by default, which allows remote attackers to spoof servers via man-in-the-middle (MITM) attacks involving hostnames that are not properly validated. NOTE: it could be argued that this is a design limitation of the Net::HTTPS API, and separate implementations should be independently assigned CVE identifiers for not working around this limitation. However, because this API was modified within LWP, a single CVE identifier has been assigned.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs669126

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libwww-perl (PTS)buster6.36-2fixed
bullseye6.52-1fixed
bookworm6.68-1fixed
sid, trixie6.77-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libwww-perlsource(unstable)6.01-1low669126

Notes

[squeeze] - libwww-perl <no-dsa> (Minor issue)

Search for package or bug name: Reporting problems