Vulnerability Description
kio/kio/tcpslavebase.cpp in KDE KSSL in kdelibs before 4.6.1 does not properly verify that the server hostname matches the domain name of the subject of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a certificate issued by a legitimate Certification Authority for an IP address, a different vulnerability than CVE-2009-2702.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Redhat | Kdelibs | <= 4.6 |
Related Weaknesses (CWE)
References
- http://openwall.com/lists/oss-security/2011/03/08/13Patch
- http://openwall.com/lists/oss-security/2011/03/08/20Patch
- http://secunia.com/advisories/44108
- http://www.mandriva.com/security/advisories?name=MDVSA-2011:071
- http://www.securityfocus.com/bid/46789
- http://www.ubuntu.com/usn/USN-1110-1
- http://www.vupen.com/english/advisories/2011/0913
- http://www.vupen.com/english/advisories/2011/0990
- https://exchange.xforce.ibmcloud.com/vulnerabilities/65986
- https://projects.kde.org/projects/kde/kdelibs/repository/revisions/76f935197599aPatch
- http://openwall.com/lists/oss-security/2011/03/08/13Patch
- http://openwall.com/lists/oss-security/2011/03/08/20Patch
- http://secunia.com/advisories/44108
- http://www.mandriva.com/security/advisories?name=MDVSA-2011:071
- http://www.securityfocus.com/bid/46789
FAQ
What is CVE-2011-1094?
CVE-2011-1094 is a vulnerability with a CVSS score of 4.3 (MEDIUM). kio/kio/tcpslavebase.cpp in KDE KSSL in kdelibs before 4.6.1 does not properly verify that the server hostname matches the domain name of the subject of an X.509 certificate, which allows man-in-the-m...
How severe is CVE-2011-1094?
CVE-2011-1094 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2011-1094?
Check the references section above for vendor advisories and patch information. Affected products include: Redhat Kdelibs.