Vulnerability Description
ownCloud Desktop Client before 1.8.2 does not call QNetworkReply::ignoreSslErrors with the list of errors to be ignored, which allows man-in-the-middle attackers to bypass the user's certificate distrust decision and obtain sensitive information by leveraging a self-signed certificate and a connection to a server using its own self-signed certificate.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Owncloud | Owncloud Desktop Client | <= 1.8.1 |
References
- http://www.debian.org/security/2015/dsa-3363
- http://www.securityfocus.com/bid/75354
- https://github.com/owncloud/client/issues/3283
- https://owncloud.org/security/advisory/?id=oc-sa-2015-009Vendor Advisory
- http://www.debian.org/security/2015/dsa-3363
- http://www.securityfocus.com/bid/75354
- https://github.com/owncloud/client/issues/3283
- https://owncloud.org/security/advisory/?id=oc-sa-2015-009Vendor Advisory
FAQ
What is CVE-2015-4456?
CVE-2015-4456 is a vulnerability with a CVSS score of 2.6 (LOW). ownCloud Desktop Client before 1.8.2 does not call QNetworkReply::ignoreSslErrors with the list of errors to be ignored, which allows man-in-the-middle attackers to bypass the user's certificate distr...
How severe is CVE-2015-4456?
CVE-2015-4456 has been rated LOW with a CVSS base score of 2.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-4456?
Check the references section above for vendor advisories and patch information. Affected products include: Owncloud Owncloud Desktop Client.