QSslSocket in Qt before 4.7.0-rc1 recognizes a wildcard IP address in the subject's Common Name field of an X.509 certificate, which might allow man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.
Version | Base score | Base severity | Vector |
---|
Hyperlink | Resource Type |
---|
QSslSocket in Qt before 4.7.0-rc1 recognizes a wildcard IP address in the subject's Common Name field of an X.509 certificate, which might allow man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.
Type | CWE ID | Description |
---|---|---|
text | N/A | n/a |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://www.ubuntu.com/usn/USN-1504-1 | vendor-advisory x_refsource_UBUNTU |
http://secunia.com/advisories/49895 | third-party-advisory x_refsource_SECUNIA |
http://rhn.redhat.com/errata/RHSA-2012-0880.html | vendor-advisory x_refsource_REDHAT |
http://secunia.com/advisories/41236 | third-party-advisory x_refsource_SECUNIA |
http://qt.gitorious.org/qt/qt/commit/846f1b44eea4bb34d080d055badb40a4a13d369e | x_refsource_CONFIRM |
http://qt.gitorious.org/qt/qt/commit/5f6018564668d368f75e431c4cdac88d7421cff0 | x_refsource_CONFIRM |
http://secunia.com/advisories/49604 | third-party-advisory x_refsource_SECUNIA |
http://www.westpoint.ltd.uk/advisories/wp-10-0001.txt | x_refsource_MISC |
https://bugreports.qt-project.org/browse/QTBUG-4455 | x_refsource_CONFIRM |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://www.ubuntu.com/usn/USN-1504-1 | vendor-advisory x_refsource_UBUNTU x_transferred |
http://secunia.com/advisories/49895 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://rhn.redhat.com/errata/RHSA-2012-0880.html | vendor-advisory x_refsource_REDHAT x_transferred |
http://secunia.com/advisories/41236 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://qt.gitorious.org/qt/qt/commit/846f1b44eea4bb34d080d055badb40a4a13d369e | x_refsource_CONFIRM x_transferred |
http://qt.gitorious.org/qt/qt/commit/5f6018564668d368f75e431c4cdac88d7421cff0 | x_refsource_CONFIRM x_transferred |
http://secunia.com/advisories/49604 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://www.westpoint.ltd.uk/advisories/wp-10-0001.txt | x_refsource_MISC x_transferred |
https://bugreports.qt-project.org/browse/QTBUG-4455 | x_refsource_CONFIRM x_transferred |
QSslSocket in Qt before 4.7.0-rc1 recognizes a wildcard IP address in the subject's Common Name field of an X.509 certificate, which might allow man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.
Date Added | Due Date | Vulnerability Name | Required Action |
---|---|---|---|
N/A |
Type | Version | Base score | Base severity | Vector |
---|---|---|---|---|
Primary | 2.0 | 4.3 | MEDIUM | AV:N/AC:M/Au:N/C:N/I:P/A:N |