{"api_version":"1","generated_at":"2026-05-13T03:12:12+00:00","cve":"CVE-2007-5965","urls":{"html":"https://cve.report/CVE-2007-5965","api":"https://cve.report/api/cve/CVE-2007-5965.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2007-5965","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2007-5965"},"summary":{"title":"CVE-2007-5965","description":"QSslSocket in Trolltech Qt 4.3.0 through 4.3.2 does not properly verify SSL certificates, which might make it easier for remote attackers to trick a user into accepting an invalid server certificate for a spoofed service, or trick a service into accepting an invalid client certificate for a user.","state":"PUBLISHED","assigner":"redhat","published_at":"2008-01-08 01:46:00","updated_at":"2026-04-23 00:35:47"},"problem_types":["CWE-264","n/a"],"metrics":[{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"4.3","severity":"","vector":"AV:N/AC:M/Au:N/C:N/I:P/A:N","data":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"}}],"references":[{"url":"http://www.novell.com/linux/security/advisories/suse_security_summary_report.html","name":"http://www.novell.com/linux/security/advisories/suse_security_summary_report.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Security Announcement","mime":"text/html","httpstatus":"404","archivestatus":"200"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=427232","name":"https://bugzilla.redhat.com/show_bug.cgi?id=427232","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Bug 427232 – CVE-2007-5965 qt4: QSslSocket may skip SSL certificate verification","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/28999","name":"http://secunia.com/advisories/28999","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Ubuntu update for qt - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/27112","name":"http://www.securityfocus.com/bid/27112","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Trolltech Qt QSslSocket Class Certificate Verification Security Bypass Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00005.html","name":"https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00005.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"[SECURITY] Fedora 8 Update: qt4-4.3.3-1.fc8","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00131.html","name":"https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00131.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"[SECURITY] Fedora 7 Update: qt4-4.3.3-1.fc7","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://trolltech.com/company/newsroom/announcements/press.2007-12-21.2182567220","name":"http://trolltech.com/company/newsroom/announcements/press.2007-12-21.2182567220","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"],"title":"Trolltech releases security fix for Qt 4.3\n        —\n        Trolltech","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://secunia.com/advisories/28321","name":"http://secunia.com/advisories/28321","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Fedora update for qt - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.ubuntu.com/usn/usn-579-1","name":"http://www.ubuntu.com/usn/usn-579-1","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"USN-579-1: Qt vulnerability | Ubuntu","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:042","name":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:042","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Support / Security / Advisories /  / MDVSA-2008:042 | Mandriva","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/28636","name":"http://secunia.com/advisories/28636","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SUSE Update for Multiple Packages - Secunia Advisories - Vulnerability Intelligence - Secunia.com","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2008/0018","name":"http://www.vupen.com/english/advisories/2008/0018","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/28228","name":"http://secunia.com/advisories/28228","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Qt QSslSocket Certificate Verification Vulnerability - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2007-5965","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-5965","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2007","cve_id":"5965","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trolltech","cpe5":"qsslsocket","cpe6":"4.3.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"5965","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trolltech","cpe5":"qsslsocket","cpe6":"4.3.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"5965","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trolltech","cpe5":"qsslsocket","cpe6":"4.3.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[{"cvename":"CVE-2007-5965","organization":"Red Hat","lastmodified":"2008-01-08","contributor":"Mark J Cox","statementText":"Not vulnerable. This issue did not affect versions of qt or qt4 packages as shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5.","cve_year":"2007","cve_id":"5965","crc32":"439bcded"}],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-07T15:47:00.719Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"name":"FEDORA-2007-4354","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00131.html"},{"name":"28999","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/28999"},{"name":"SUSE-SR:2008:002","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://www.novell.com/linux/security/advisories/suse_security_summary_report.html"},{"name":"27112","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/27112"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=427232"},{"name":"FEDORA-2007-4285","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00005.html"},{"name":"28228","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/28228"},{"name":"MDVSA-2008:042","tags":["vendor-advisory","x_refsource_MANDRIVA","x_transferred"],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:042"},{"name":"ADV-2008-0018","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2008/0018"},{"name":"USN-579-1","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"http://www.ubuntu.com/usn/usn-579-1"},{"name":"28636","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/28636"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://trolltech.com/company/newsroom/announcements/press.2007-12-21.2182567220"},{"name":"28321","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/28321"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2007-12-21T00:00:00.000Z","descriptions":[{"lang":"en","value":"QSslSocket in Trolltech Qt 4.3.0 through 4.3.2 does not properly verify SSL certificates, which might make it easier for remote attackers to trick a user into accepting an invalid server certificate for a spoofed service, or trick a service into accepting an invalid client certificate for a user."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2008-02-01T10:00:00.000Z","orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat"},"references":[{"name":"FEDORA-2007-4354","tags":["vendor-advisory","x_refsource_FEDORA"],"url":"https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00131.html"},{"name":"28999","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/28999"},{"name":"SUSE-SR:2008:002","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://www.novell.com/linux/security/advisories/suse_security_summary_report.html"},{"name":"27112","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/27112"},{"tags":["x_refsource_MISC"],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=427232"},{"name":"FEDORA-2007-4285","tags":["vendor-advisory","x_refsource_FEDORA"],"url":"https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00005.html"},{"name":"28228","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/28228"},{"name":"MDVSA-2008:042","tags":["vendor-advisory","x_refsource_MANDRIVA"],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:042"},{"name":"ADV-2008-0018","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2008/0018"},{"name":"USN-579-1","tags":["vendor-advisory","x_refsource_UBUNTU"],"url":"http://www.ubuntu.com/usn/usn-579-1"},{"name":"28636","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/28636"},{"tags":["x_refsource_CONFIRM"],"url":"http://trolltech.com/company/newsroom/announcements/press.2007-12-21.2182567220"},{"name":"28321","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/28321"}]}},"cveMetadata":{"assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","assignerShortName":"redhat","cveId":"CVE-2007-5965","datePublished":"2008-01-08T01:00:00.000Z","dateReserved":"2007-11-14T00:00:00.000Z","dateUpdated":"2024-08-07T15:47:00.719Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2008-01-08 01:46:00","lastModifiedDate":"2026-04-23 00:35:47","problem_types":["CWE-264","n/a"],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:trolltech:qsslsocket:4.3.0:*:*:*:*:*:*:*","matchCriteriaId":"BC3FF434-BE6C-4C4B-8356-14D31497D4DD"},{"vulnerable":true,"criteria":"cpe:2.3:a:trolltech:qsslsocket:4.3.1:*:*:*:*:*:*:*","matchCriteriaId":"336C6B49-EDF5-44FD-8437-D03116D01F82"},{"vulnerable":true,"criteria":"cpe:2.3:a:trolltech:qsslsocket:4.3.2:*:*:*:*:*:*:*","matchCriteriaId":"9CE4CAED-50AD-4D3E-92C9-8CF96DC3446D"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2007","CveId":"5965","Ordinal":"1","Title":"CVE-2007-5965","CVE":"CVE-2007-5965","Year":"2007"},"notes":[{"CveYear":"2007","CveId":"5965","Ordinal":"1","NoteData":"QSslSocket in Trolltech Qt 4.3.0 through 4.3.2 does not properly verify SSL certificates, which might make it easier for remote attackers to trick a user into accepting an invalid server certificate for a spoofed service, or trick a service into accepting an invalid client certificate for a user.","Type":"Description","Title":"CVE-2007-5965"},{"CveYear":"2007","CveId":"5965","Ordinal":"2","NoteData":"2008-01-07","Type":"Other","Title":"Published"},{"CveYear":"2007","CveId":"5965","Ordinal":"3","NoteData":"2008-02-01","Type":"Other","Title":"Modified"}]}}}