Vulnerability Details : CVE-2007-5965
QSslSocket in Trolltech Qt 4.3.0 through 4.3.2 does not properly verify SSL certificates, which might make it easier for remote attackers to trick a user into accepting an invalid server certificate for a spoofed service, or trick a service into accepting an invalid client certificate for a user.
Products affected by CVE-2007-5965
- cpe:2.3:a:trolltech:qsslsocket:4.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:trolltech:qsslsocket:4.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:trolltech:qsslsocket:4.3.2:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2007-5965
1.24%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 77 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2007-5965
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:P/A:N |
8.6
|
2.9
|
NIST |
CWE ids for CVE-2007-5965
-
Assigned by: nvd@nist.gov (Primary)
Vendor statements for CVE-2007-5965
-
Red Hat 2008-01-08Not vulnerable. This issue did not affect versions of qt or qt4 packages as shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5.
References for CVE-2007-5965
-
http://www.mandriva.com/security/advisories?name=MDVSA-2008:042
-
http://www.novell.com/linux/security/advisories/suse_security_summary_report.html
-
https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00005.html
-
http://www.ubuntu.com/usn/usn-579-1
-
https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00131.html
-
https://bugzilla.redhat.com/show_bug.cgi?id=427232
-
http://secunia.com/advisories/28636
About Secunia Research | Flexera
-
http://secunia.com/advisories/28999
-
http://secunia.com/advisories/28321
Vendor Advisory
-
http://trolltech.com/company/newsroom/announcements/press.2007-12-21.2182567220
Patch
-
http://www.securityfocus.com/bid/27112
-
http://www.vupen.com/english/advisories/2008/0018
-
http://secunia.com/advisories/28228
Vendor Advisory
Jump to