Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2007-5965
Modified
More InfoOfficial Page
Source-secalert@redhat.com
View Known Exploited Vulnerability (KEV) details
Published At-08 Jan, 2008 | 01:46
Updated At-08 Mar, 2011 | 03:01

QSslSocket in Trolltech Qt 4.3.0 through 4.3.2 does not properly verify SSL certificates, which might make it easier for remote attackers to trick a user into accepting an invalid server certificate for a spoofed service, or trick a service into accepting an invalid client certificate for a user.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.04.3MEDIUM
AV:N/AC:M/Au:N/C:N/I:P/A:N
Type: Primary
Version: 2.0
Base score: 4.3
Base severity: MEDIUM
Vector:
AV:N/AC:M/Au:N/C:N/I:P/A:N
CPE Matches

trolltech
trolltech
>>qsslsocket>>4.3.0
cpe:2.3:a:trolltech:qsslsocket:4.3.0:*:*:*:*:*:*:*
trolltech
trolltech
>>qsslsocket>>4.3.1
cpe:2.3:a:trolltech:qsslsocket:4.3.1:*:*:*:*:*:*:*
trolltech
trolltech
>>qsslsocket>>4.3.2
cpe:2.3:a:trolltech:qsslsocket:4.3.2:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-264Primarynvd@nist.gov
CWE ID: CWE-264
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

Organization : Red Hat
Last Modified : 2008-01-08T00:00:00

Not vulnerable. This issue did not affect versions of qt or qt4 packages as shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5.

References
HyperlinkSourceResource
http://secunia.com/advisories/28228secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/28321secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/28636secalert@redhat.com
N/A
http://secunia.com/advisories/28999secalert@redhat.com
N/A
http://trolltech.com/company/newsroom/announcements/press.2007-12-21.2182567220secalert@redhat.com
Patch
http://www.mandriva.com/security/advisories?name=MDVSA-2008:042secalert@redhat.com
N/A
http://www.novell.com/linux/security/advisories/suse_security_summary_report.htmlsecalert@redhat.com
N/A
http://www.securityfocus.com/bid/27112secalert@redhat.com
N/A
http://www.ubuntu.com/usn/usn-579-1secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2008/0018secalert@redhat.com
N/A
https://bugzilla.redhat.com/show_bug.cgi?id=427232secalert@redhat.com
N/A
https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00005.htmlsecalert@redhat.com
N/A
https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00131.htmlsecalert@redhat.com
N/A
Hyperlink: http://secunia.com/advisories/28228
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/28321
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/28636
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/28999
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://trolltech.com/company/newsroom/announcements/press.2007-12-21.2182567220
Source: secalert@redhat.com
Resource:
Patch
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2008:042
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.novell.com/linux/security/advisories/suse_security_summary_report.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/27112
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.ubuntu.com/usn/usn-579-1
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2008/0018
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=427232
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00005.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00131.html
Source: secalert@redhat.com
Resource: N/A
Change History
0Changes found

Details not found