Upstream information
Description
Google Chrome before 18.0.1025.142 does not properly check X.509 certificates before use of a SPDY proxy, which might allow man-in-the-middle attackers to spoof servers or obtain sensitive information via a crafted certificate.SUSE information
Overall state of this security issue: Does not affect SUSE products
This issue is currently rated as having moderate severity.
| National Vulnerability Database | |
|---|---|
| Base Score | 5.8 | 
| Vector | AV:N/AC:M/Au:N/C:P/I:P/A:N | 
| Access Vector | Network | 
| Access Complexity | Medium | 
| Authentication | None | 
| Confidentiality Impact | Partial | 
| Integrity Impact | Partial | 
| Availability Impact | None | 
List of released packages
| Product(s) | Fixed package version(s) | References | 
|---|---|---|
| openSUSE Leap 15.0 | 
  |  Patchnames:  openSUSE Leap 15.0 GA chromium-66.0.3359.170-lp150.1.1  | 
| openSUSE Tumbleweed | 
  |  Patchnames:  openSUSE-Tumbleweed-2024-10171 openSUSE-Tumbleweed-2024-12948  | 
SUSE Timeline for this CVE
CVE page created: Tue Jul 9 19:14:29 2013CVE page last modified: Tue Sep 3 18:16:31 2024