Gizmo5 for Linux SSL security bypass

gizmo5-ssl-security-bypass (51399) The risk level is classified as MediumMedium Risk


Gizmo5 for Linux could allow a remote attacker to bypass security restrictions, caused by improper verification of SSL certificates. A remote attacker could exploit this vulnerability using man-in-the-middle techniques to spoof SSL certificates and redirect a user to a malicious Web site that would appear to be trusted. This could allow the attacker to obtain sensitive information that could be used to launch further attacks against the victim's system.


Base Score: 5
  Access Vector: Network
  Access Complexity: Low
  Authentication: None
  Confidentiality Impact: None
  Integrity Impact: Partial
  Availability Impact: None
Temporal Score: 4
  Exploitability: Unproven
  Remediation Level: Unavailable
  Report Confidence: Uncorroborated


Bypass Security


No remedy available as of September 1, 2014.


  • BugTraq Mailing List, Fri Jun 26 2009 - 08:35:05 CDT : Gizmo SSL Certificate Vulnerability.
  • Gizmo5 Web site: Gizmo5 for Linux.
  • BID-35508: Gizmo5 for Linux MSN Authentication SSL Certificate Validation Security Bypass Vulnerability
  • CVE-2009-2381: Gizmo on Linux does not verify a server's SSL certificate, which allows remote servers to obtain the credentials of arbitrary users via a spoofed certificate.
  • OSVDB ID: 55556: Gizmo on Linux MSN Protocol SSL Certificate Validation Weakness
  • SA35621: aMSN SSL Certificate Validation Security Issue
  • SA35628: Gizmo SSL Certificate Validation Security Issue

Platforms Affected:

  • Gizmo5 Gizmo5 for Linux


Jun 26, 2009

The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.

For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this

Return to the main page