CVE-2012-6093

The QSslSocket::sslErrors function in Qt before 4.6.5, 4.7.x before 4.7.6, 4.8.x before 4.8.5, when using certain versions of openSSL, uses an "incompatible structure layout" that can read memory from the wrong location, which causes Qt to report an incorrect error when certificate validation fails and might cause users to make unsafe security decisions to accept a certificate.
References
Link Resource
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=697582
http://lists.opensuse.org/opensuse-updates/2013-01/msg00086.html
http://lists.opensuse.org/opensuse-updates/2013-01/msg00089.html
http://lists.opensuse.org/opensuse-updates/2013-02/msg00014.html
http://lists.qt-project.org/pipermail/announce/2013-January/000020.html Vendor Advisory
http://qt.gitorious.org/qt/qt/commit/3b14dc93cf0ef06f1424d7d6319a1af4505faa53%20%284.7%29
http://qt.gitorious.org/qt/qt/commit/691e78e5061d4cbc0de212d23b06c5dffddf2098%20%284.8%29
http://secunia.com/advisories/52217 Vendor Advisory
http://www.openwall.com/lists/oss-security/2013/01/04/6
http://www.ubuntu.com/usn/USN-1723-1
https://bugzilla.redhat.com/show_bug.cgi?id=891955
https://codereview.qt-project.org/#change%2C42461
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=697582
http://lists.opensuse.org/opensuse-updates/2013-01/msg00086.html
http://lists.opensuse.org/opensuse-updates/2013-01/msg00089.html
http://lists.opensuse.org/opensuse-updates/2013-02/msg00014.html
http://lists.qt-project.org/pipermail/announce/2013-January/000020.html Vendor Advisory
http://qt.gitorious.org/qt/qt/commit/3b14dc93cf0ef06f1424d7d6319a1af4505faa53%20%284.7%29
http://qt.gitorious.org/qt/qt/commit/691e78e5061d4cbc0de212d23b06c5dffddf2098%20%284.8%29
http://secunia.com/advisories/52217 Vendor Advisory
http://www.openwall.com/lists/oss-security/2013/01/04/6
http://www.ubuntu.com/usn/USN-1723-1
https://bugzilla.redhat.com/show_bug.cgi?id=891955
https://codereview.qt-project.org/#change%2C42461
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:qt:qt:*:rc:*:*:*:*:*:*
cpe:2.3:a:qt:qt:4.6.0:*:*:*:*:*:*:*
cpe:2.3:a:qt:qt:4.6.0:rc1:*:*:*:*:*:*
cpe:2.3:a:qt:qt:4.6.1:*:*:*:*:*:*:*
cpe:2.3:a:qt:qt:4.6.2:*:*:*:*:*:*:*
cpe:2.3:a:qt:qt:4.6.3:*:*:*:*:*:*:*
cpe:2.3:a:qt:qt:4.6.4:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:qt:qt:4.7.0:*:*:*:*:*:*:*
cpe:2.3:a:qt:qt:4.7.1:*:*:*:*:*:*:*
cpe:2.3:a:qt:qt:4.7.2:*:*:*:*:*:*:*
cpe:2.3:a:qt:qt:4.7.3:*:*:*:*:*:*:*
cpe:2.3:a:qt:qt:4.7.4:*:*:*:*:*:*:*
cpe:2.3:a:qt:qt:4.7.5:*:*:*:*:*:*:*
cpe:2.3:a:qt:qt:4.7.6:rc:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:qt:qt:4.8.0:*:*:*:*:*:*:*
cpe:2.3:a:qt:qt:4.8.1:*:*:*:*:*:*:*
cpe:2.3:a:qt:qt:4.8.2:*:*:*:*:*:*:*
cpe:2.3:a:qt:qt:4.8.3:*:*:*:*:*:*:*
cpe:2.3:a:qt:qt:4.8.4:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*

History

21 Nov 2024, 01:45

Type Values Removed Values Added
References () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=697582 - () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=697582 -
References () http://lists.opensuse.org/opensuse-updates/2013-01/msg00086.html - () http://lists.opensuse.org/opensuse-updates/2013-01/msg00086.html -
References () http://lists.opensuse.org/opensuse-updates/2013-01/msg00089.html - () http://lists.opensuse.org/opensuse-updates/2013-01/msg00089.html -
References () http://lists.opensuse.org/opensuse-updates/2013-02/msg00014.html - () http://lists.opensuse.org/opensuse-updates/2013-02/msg00014.html -
References () http://lists.qt-project.org/pipermail/announce/2013-January/000020.html - Vendor Advisory () http://lists.qt-project.org/pipermail/announce/2013-January/000020.html - Vendor Advisory
References () http://qt.gitorious.org/qt/qt/commit/3b14dc93cf0ef06f1424d7d6319a1af4505faa53%20%284.7%29 - () http://qt.gitorious.org/qt/qt/commit/3b14dc93cf0ef06f1424d7d6319a1af4505faa53%20%284.7%29 -
References () http://qt.gitorious.org/qt/qt/commit/691e78e5061d4cbc0de212d23b06c5dffddf2098%20%284.8%29 - () http://qt.gitorious.org/qt/qt/commit/691e78e5061d4cbc0de212d23b06c5dffddf2098%20%284.8%29 -
References () http://secunia.com/advisories/52217 - Vendor Advisory () http://secunia.com/advisories/52217 - Vendor Advisory
References () http://www.openwall.com/lists/oss-security/2013/01/04/6 - () http://www.openwall.com/lists/oss-security/2013/01/04/6 -
References () http://www.ubuntu.com/usn/USN-1723-1 - () http://www.ubuntu.com/usn/USN-1723-1 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=891955 - () https://bugzilla.redhat.com/show_bug.cgi?id=891955 -
References () https://codereview.qt-project.org/#change%2C42461 - () https://codereview.qt-project.org/#change%2C42461 -

Information

Published : 2013-02-24 19:55

Updated : 2024-11-21 01:45


NVD link : CVE-2012-6093

Mitre link : CVE-2012-6093

CVE.ORG link : CVE-2012-6093


JSON object : View

Products Affected

canonical

  • ubuntu_linux

opensuse

  • opensuse

qt

  • qt
CWE
CWE-310

Cryptographic Issues