CVE-2014-0350

NameCVE-2014-0350
DescriptionThe Poco::Net::X509Certificate::verify method in the NetSSL library in POCO C++ Libraries before 1.4.6p4 allows man-in-the-middle attackers to spoof SSL servers via crafted DNS PTR records that are requested during comparison of a server name to a wildcard domain name in an X.509 certificate.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-1239-1
NVD severitymedium
Debian Bugs746637

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
poco (PTS)stretch (security), stretch1.7.6+dfsg1-5+deb9u1fixed
buster1.9.0-5fixed
bullseye1.10.0-6+deb11u1fixed
bookworm, sid1.11.0-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
pocosourcewheezy1.3.6p1-4+deb7u1DLA-1239-1
pocosource(unstable)1.3.6p1-5low746637

Notes

[squeeze] - poco <no-dsa> (Minor issue)

Search for package or bug name: Reporting problems