CVE-2012-6709

NameCVE-2012-6709
DescriptionELinks 0.12 and Twibright Links 2.3 have Missing SSL Certificate Validation.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium (attack range: remote)
Debian Bugs510417, 694658, 891575

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
elinks (PTS)jessie0.12~pre6-5vulnerable
stretch0.12~pre6-12vulnerable
buster, sid0.12~pre6-13vulnerable
links2 (PTS)jessie2.8-2fixed
stretch2.14-2fixed
buster, sid2.16-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
elinkssource(unstable)(unfixed)low891575
links2source(unstable)2.6-1medium510417, 694658

Notes

[stretch] - elinks <ignored> (Minor issue)
[jessie] - elinks <ignored> (Minor issue)
[wheezy] - elinks <ignored> (Minor issue)
Patch proposed upstream (when using): http://lists.linuxfromscratch.org/pipermail/elinks-dev/2015-June/002099.html
tested links2 against badssl.com, no apparent issue back in wheezy
src:links2/2.6-1 adds verify-ssl-certs-510417.diff to verify SSL certs.
src:links2 upstream in 2.11 adds support for verifying SSL certificates.

Search for package or bug name: Reporting problems