CVE Vulnerabilities

CVE-2017-5066

Improper Verification of Cryptographic Signature

Published: Oct 27, 2017 | Modified: Apr 20, 2025
CVSS 3.x
6.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
CVSS 2.x
4.3 MEDIUM
AV:N/AC:M/Au:N/C:N/I:P/A:N
RedHat/V2
RedHat/V3
6.5 MODERATE
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

Insufficient consistency checks in signature handling in the networking stack in Google Chrome prior to 58.0.3029.81 for Mac, Windows, and Linux, and 58.0.3029.83 for Android, allowed a remote attacker to incorrectly accept a badly formed X.509 certificate via a crafted HTML page.

Weakness

The product does not verify, or incorrectly verifies, the cryptographic signature for data.

Affected Software

NameVendorStart VersionEnd Version
ChromeGoogle*58.0.3029.81 (excluding)
Red Hat Enterprise Linux 6 SupplementaryRedHatchromium-browser-0:58.0.3029.81-1.el6_9*
Chromium-browserUbuntuartful*
Chromium-browserUbuntubionic*
Chromium-browserUbuntucosmic*
Chromium-browserUbuntudevel*
Chromium-browserUbuntuprecise*
Chromium-browserUbuntutrusty*
Chromium-browserUbuntuupstream*
Chromium-browserUbuntuxenial*
Chromium-browserUbuntuyakkety*
Chromium-browserUbuntuzesty*
Oxide-qtUbuntuartful*
Oxide-qtUbuntuesm-infra/xenial*
Oxide-qtUbuntutrusty*
Oxide-qtUbuntuvivid/stable-phone-overlay*
Oxide-qtUbuntuxenial*
Oxide-qtUbuntuyakkety*
Oxide-qtUbuntuzesty*

References