QSslSocket in Qt before 4.7.0-rc1 recognizes a wildcard IP address in the subject's Common Name field of an X.509 certificate, which might allow man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://www.ubuntu.com/usn/USN-1504-1 | vendor advisory |
http://secunia.com/advisories/49895 | third party advisory vendor advisory |
http://rhn.redhat.com/errata/RHSA-2012-0880.html | vendor advisory |
http://secunia.com/advisories/41236 | third party advisory vendor advisory |
http://qt.gitorious.org/qt/qt/commit/846f1b44eea4bb34d080d055badb40a4a13d369e | patch |
http://qt.gitorious.org/qt/qt/commit/5f6018564668d368f75e431c4cdac88d7421cff0 | patch exploit |
http://secunia.com/advisories/49604 | third party advisory vendor advisory |
http://www.westpoint.ltd.uk/advisories/wp-10-0001.txt | |
https://bugreports.qt-project.org/browse/QTBUG-4455 |