| Portée | Impact | Probabilité |
|---|---|---|
| Non-Repudiation | Hide Activities Note: Exploitation of this flaw can lead to the trust of data that may have originated with a spoofed source. | |
| Integrity Confidentiality Availability Access Control | Gain Privileges or Assume Identity, Execute Unauthorized Code or Commands Note: Data, requests, or actions taken by the attacking entity can be carried out as a spoofed benign entity. |
| Références | Description |
|---|---|
CVE-2016-2402 | Server allows bypass of certificate pinning by sending a chain of trust that includes a trusted CA that is not pinned. |
CVE-2008-4989 | Verification function trusts certificate chains in which the last certificate is self-signed. |
CVE-2012-5821 | Chain: Web browser uses a TLS-related function incorrectly, preventing it from verifying that a server's certificate is signed by a trusted certification authority (CA). |
CVE-2009-3046 | Web browser does not check if any intermediate certificates are revoked. |
CVE-2009-0265 | chain: DNS server does not correctly check return value from the OpenSSL EVP_VerifyFinal function allows bypass of validation of the certificate chain. |
CVE-2009-0124 | chain: incorrect check of return value from the OpenSSL EVP_VerifyFinal function allows bypass of validation of the certificate chain. |
CVE-2002-0970 | File-transfer software does not validate Basic Constraints of an intermediate CA-signed certificate. |
CVE-2002-0862 | Cryptographic API, as used in web browsers, mail clients, and other software, does not properly validate Basic Constraints. |
| Nom | Organisation | Date | Date de publication | Version |
|---|---|---|---|---|
| CLASP | Draft 3 |
| Nom | Organisation | Date | Commentaire |
|---|---|---|---|
| Eric Dalci | Cigital | updated Time_of_Introduction | |
| CWE Content Team | MITRE | updated Common_Consequences, Relationships, Other_Notes, Taxonomy_Mappings | |
| CWE Content Team | MITRE | updated Description, Name, Relationships | |
| CWE Content Team | MITRE | updated Demonstrative_Examples | |
| CWE Content Team | MITRE | updated Demonstrative_Examples | |
| CWE Content Team | MITRE | updated Other_Notes | |
| CWE Content Team | MITRE | updated Common_Consequences | |
| CWE Content Team | MITRE | updated References, Relationships | |
| CWE Content Team | MITRE | updated Applicable_Platforms, Demonstrative_Examples, Description, Name, Observed_Examples, Other_Notes, References, Relationships | |
| CWE Content Team | MITRE | updated Relationships | |
| CWE Content Team | MITRE | updated Demonstrative_Examples, Relationships | |
| CWE Content Team | MITRE | updated Demonstrative_Examples, Modes_of_Introduction, References, Relationships | |
| CWE Content Team | MITRE | updated Modes_of_Introduction, Observed_Examples, Potential_Mitigations, Time_of_Introduction | |
| CWE Content Team | MITRE | updated Demonstrative_Examples | |
| CWE Content Team | MITRE | updated Demonstrative_Examples, References, Relationships | |
| CWE Content Team | MITRE | updated Demonstrative_Examples | |
| CWE Content Team | MITRE | updated Relationships | |
| CWE Content Team | MITRE | updated Relationships | |
| CWE Content Team | MITRE | updated Description, Modes_of_Introduction | |
| CWE Content Team | MITRE | updated Detection_Factors, Relationships, Time_of_Introduction | |
| CWE Content Team | MITRE | updated Mapping_Notes | |
| CWE Content Team | MITRE | updated References | |
| CWE Content Team | MITRE | updated Applicable_Platforms, Relationships, Weakness_Ordinalities |