Summary
This host is installed with Gizmo5 and is prone to Security Bypass vulnerability.
Impact
Successful exploitation will allow remote attackers to obtain sensitive information that could be used to launch further attacks against the victim's system.
Impact Level: System/Application
Solution
No solution or patch was made available for at least one year since disclosure of this vulnerability. Likely none will be provided anymore.
General solution options are to upgrade to a newer release, disable respective features, remove the product or replace the product by another one.
Insight
Error exists due to improper verification of SSL certificates which can be exploited by using man-in-the-middle techniques to spoof SSL certificates and redirect a user to a malicious Web site that would appear to be trusted.
Affected
Gizmo5 version 3.1.0.79 and prior on Linux
References
Severity
Classification
-
CVE CVE-2009-2381 -
CVSS Base Score: 5.0
AV:N/AC:L/Au:N/C:P/I:N/A:N
Related Vulnerabilities
- Apache Tomcat Default Accounts
- Adobe Flash Player Multiple Security Bypass Vulnerabilities - 01 Feb14 (Linux)
- Adobe Reader Multiple Vulnerabilities - Aug07 (Mac OS X)
- Adobe Reader Plugin Signature Bypass Vulnerability (Mac OS X)
- Asterisk SIP Response Username Enumeration Remote Information Disclosure Vulnerability