The Poco::Net::X509Certificate::verify method in the NetSSL library in POCO C++ Libraries before 1.4.6p4 allows man-in-the-middle attackers to spoof SSL servers via crafted DNS PTR records that are requested during comparison of a server name to a wildcard domain name in an X.509 certificate.
Weaknesses in this category are related to the design and implementation of data confidentiality and integrity. Frequently these deal with the use of encoding techniques, encryption libraries, and hashing algorithms. The weaknesses in this category could lead to a degradation of the quality data if they are not addressed.
Link | Tags |
---|---|
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177573.html | vendor advisory |
http://www.kb.cert.org/vuls/id/118748 | third party advisory us government resource |
https://raw.githubusercontent.com/pocoproject/poco/poco-1.4.6p4-release/CHANGELOG | |
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177471.html | vendor advisory |