The product does not check the revocation status of a certificate after its initial revocation check, which can cause the product to perform privileged actions even after the certificate is revoked at a later time.
If the revocation status of a certificate is not checked before each action that requires privileges, the system may be subject to a race condition. If a certificate is revoked after the initial check, all subsequent actions taken with the owner of the revoked certificate will lose all benefits guaranteed by the certificate. In fact, it is almost certain that the use of a revoked certificate indicates malicious activity.
Impact: Gain Privileges or Assume Identity
Trust may be assigned to an entity who is not who it claims to be.
Impact: Modify Application Data
Data from an untrusted (and possibly malicious) source may be integrated.
Impact: Read Application Data
Data may be disclosed to an entity impersonating a trusted entity, resulting in information disclosure.
c
//do stuff* foo=SSL_get_verify_result(ssl);
cMedium