The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

computer vulnerability CVE-2012-6093

Qt: incorrect error report of QSslSocket

Synthesis of the vulnerability

When Qt is used with an OpenSSL version which is different from the version it was compiled with, and when a SSL certificate is invalid, the QSslSocket::sslErrors() function returns an incorrect error code/message, which can deceive the user.
Impacted products: Fedora, openSUSE, Unix (platform).
Severity: 2/4.
Creation date: 04/01/2013.
Identifiers: BID-57162, CVE-2012-6093, FEDORA-2013-0199, FEDORA-2013-0270, FEDORA-2013-0277, openSUSE-SU-2013:0204-1, openSUSE-SU-2013:0211-1, openSUSE-SU-2013:0256-1, VIGILANCE-VUL-12285.

Description of the vulnerability

The QSslSocket class of Qt implements the support of SSL/TLS. The OpenSSL library is used to provide the low level features.

The QSslSocket::sslErrors() function indicates errors which occur during a SSL session. This function directly uses the "error" field from the OpenSSL X509_STORE_CTX structure. However, between OpenSSL version 0.9 and 1.0, the layout of the X509_STORE_CTX structure was changed, and the "error" field is not located at the same place. Its value is thus incoherent.

When Qt is used with an OpenSSL version which is different from the version it was compiled with, and when a SSL certificate is invalid, the QSslSocket::sslErrors() function therefore returns an incorrect error code/message, which can deceive the user.
Complete Vigil@nce bulletin.... (free trial)

Computer vulnerabilities tracking service

Vigil@nce provides a software vulnerabilities management. Each administrator can customize the list of products for which he wants to receive vulnerability alerts. The Vigil@nce computer vulnerability tracking service alerts your teams of vulnerabilities or threats impacting your information system. The Vigil@nce team tracks computer vulnerabilities impacting systems and applications.