CVE-2012-6093
Summary
| CVE | CVE-2012-6093 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2013-02-24 19:55:00 UTC |
| Updated | 2023-02-13 00:27:00 UTC |
| Description | The QSslSocket::sslErrors function in Qt before 4.6.5, 4.7.x before 4.7.6, 4.8.x before 4.8.5, when using certain versions of openSSL, uses an "incompatible structure layout" that can read memory from the wrong location, which causes Qt to report an incorrect error when certificate validation fails and might cause users to make unsafe security decisions to accept a certificate. |
Risk And Classification
Problem Types: CWE-310
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Canonical | Ubuntu Linux | 10.04 | - | lts | All |
| Operating System | Canonical | Ubuntu Linux | 11.10 | All | All | All |
| Operating System | Canonical | Ubuntu Linux | 12.04 | - | lts | All |
| Operating System | Canonical | Ubuntu Linux | 12.10 | All | All | All |
| Operating System | Canonical | Ubuntu Linux | 10.04 | - | lts | All |
| Operating System | Canonical | Ubuntu Linux | 11.10 | All | All | All |
| Operating System | Canonical | Ubuntu Linux | 12.04 | - | lts | All |
| Operating System | Canonical | Ubuntu Linux | 12.10 | All | All | All |
| Application | Digia | Qt | 4.6.0 | All | All | All |
| Application | Digia | Qt | 4.6.0 | rc1 | All | All |
| Application | Digia | Qt | 4.6.1 | All | All | All |
| Application | Digia | Qt | 4.6.2 | All | All | All |
| Application | Digia | Qt | 4.6.3 | All | All | All |
| Application | Digia | Qt | 4.6.4 | All | All | All |
| Application | Digia | Qt | 4.7.0 | All | All | All |
| Application | Digia | Qt | 4.7.1 | All | All | All |
| Application | Digia | Qt | 4.7.2 | All | All | All |
| Application | Digia | Qt | 4.7.3 | All | All | All |
| Application | Digia | Qt | 4.7.4 | All | All | All |
| Application | Digia | Qt | 4.7.5 | All | All | All |
| Application | Digia | Qt | 4.7.6 | rc | All | All |
| Application | Digia | Qt | 4.8.0 | All | All | All |
| Application | Digia | Qt | 4.8.1 | All | All | All |
| Application | Digia | Qt | 4.8.2 | All | All | All |
| Application | Digia | Qt | 4.8.3 | All | All | All |
| Application | Digia | Qt | 4.8.4 | All | All | All |
| Application | Digia | Qt | 4.6.0 | All | All | All |
| Application | Digia | Qt | 4.6.0 | rc1 | All | All |
| Application | Digia | Qt | 4.6.1 | All | All | All |
| Application | Digia | Qt | 4.6.2 | All | All | All |
| Application | Digia | Qt | 4.6.3 | All | All | All |
| Application | Digia | Qt | 4.6.4 | All | All | All |
| Application | Digia | Qt | 4.7.0 | All | All | All |
| Application | Digia | Qt | 4.7.1 | All | All | All |
| Application | Digia | Qt | 4.7.2 | All | All | All |
| Application | Digia | Qt | 4.7.3 | All | All | All |
| Application | Digia | Qt | 4.7.4 | All | All | All |
| Application | Digia | Qt | 4.7.5 | All | All | All |
| Application | Digia | Qt | 4.7.6 | rc | All | All |
| Application | Digia | Qt | 4.8.0 | All | All | All |
| Application | Digia | Qt | 4.8.1 | All | All | All |
| Application | Digia | Qt | 4.8.2 | All | All | All |
| Application | Digia | Qt | 4.8.3 | All | All | All |
| Application | Digia | Qt | 4.8.4 | All | All | All |
| Application | Digia | Qt | All | rc | All | All |
| Operating System | Opensuse | Opensuse | 11.4 | All | All | All |
| Operating System | Opensuse | Opensuse | 12.2 | All | All | All |
| Operating System | Opensuse | Opensuse | 11.4 | All | All | All |
| Operating System | Opensuse | Opensuse | 12.2 | All | All | All |
| Application | Qt | Qt | 4.6.0 | All | All | All |
| Application | Qt | Qt | 4.6.0 | rc1 | All | All |
| Application | Qt | Qt | 4.6.1 | All | All | All |
| Application | Qt | Qt | 4.6.2 | All | All | All |
| Application | Qt | Qt | 4.6.3 | All | All | All |
| Application | Qt | Qt | 4.6.4 | All | All | All |
| Application | Qt | Qt | 4.7.0 | All | All | All |
| Application | Qt | Qt | 4.7.1 | All | All | All |
| Application | Qt | Qt | 4.7.2 | All | All | All |
| Application | Qt | Qt | 4.7.3 | All | All | All |
| Application | Qt | Qt | 4.7.4 | All | All | All |
| Application | Qt | Qt | 4.7.5 | All | All | All |
| Application | Qt | Qt | 4.7.6 | rc | All | All |
| Application | Qt | Qt | 4.8.0 | All | All | All |
| Application | Qt | Qt | 4.8.1 | All | All | All |
| Application | Qt | Qt | 4.8.2 | All | All | All |
| Application | Qt | Qt | 4.8.3 | All | All | All |
| Application | Qt | Qt | 4.8.4 | All | All | All |
| Application | Qt | Qt | All | rc | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| [Announce] Qt Project Security Advisory: QSslSocket may report incorrect errors when certificate verification fails | MLIST | lists.qt-project.org | Vendor Advisory |
| openSUSE-SU-2013:0256-1: moderate: libqt4: various SSL / certificate rel | SUSE | lists.opensuse.org | |
| openSUSE-SU-2013:0204-1: moderate: update for libqt4 | SUSE | lists.opensuse.org | |
| Gerrit Code Review | MISC | codereview.qt-project.org | |
| oss-security - Re: CVE Request -- qt: QSslSocket might report inappropriate errors when certificate verification fails | MLIST | www.openwall.com | |
| qt.gitorious.org/qt/qt/commit/691e78e5061d4cbc0de212d23b06c5dffddf2098%20%284.... | CONFIRM | qt.gitorious.org | |
| 891955 – (CVE-2012-6093) CVE-2012-6093 qt: QSslSocket might report inappropriate errors when certificate verification fails | MISC | bugzilla.redhat.com | |
| qt.gitorious.org/qt/qt/commit/3b14dc93cf0ef06f1424d7d6319a1af4505faa53%20%284.... | CONFIRM | qt.gitorious.org | |
| Gerrit Code Review | CONFIRM | codereview.qt-project.org | |
| USN-1723-1: Qt vulnerabilities | Ubuntu | UBUNTU | www.ubuntu.com | |
| #697582 - qt4-x11: CVE-2012-6093 - Debian Bug report logs | MISC | bugs.debian.org | |
| openSUSE-SU-2013:0211-1: moderate: update for libqt4 | SUSE | lists.opensuse.org | |
| Security Advisory SA52217 - Ubuntu update for Qt - Secunia | SECUNIA | secunia.com | Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.