Medium severity5.9NVD Advisory· Published Nov 4, 2012· Updated Apr 29, 2026
CVE-2012-5821
CVE-2012-5821
Description
Lynx does not verify that the server's certificate is signed by a trusted certification authority, which allows man-in-the-middle attackers to spoof SSL servers via a crafted certificate, related to improper use of a certain GnuTLS function.
Affected products
5cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*+ 3 more
- cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- www.cs.utexas.edu/~shmat/shmat_ccs12.pdfnvdExploit
- www.ubuntu.com/usn/USN-1642-1nvdThird Party Advisory
- exchange.xforce.ibmcloud.com/vulnerabilities/79930nvdThird Party AdvisoryVDB Entry
- wiki.mageia.org/en/Support/Advisories/MGASA-2012-0351nvdThird Party Advisory
- www.mandriva.com/security/advisoriesnvdBroken Link
News mentions
0No linked articles in our index yet.