First published: Wed Mar 16 2011(Updated: )
kio/kio/tcpslavebase.cpp in KDE KSSL in kdelibs before 4.6.1 does not properly verify that the server hostname matches the domain name of the subject of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a certificate issued by a legitimate Certification Authority for an IP address, a different vulnerability than CVE-2009-2702.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
KDE kdelibs | <=4.6 | |
KDE kdelibs | =3.5.10 | |
KDE kdelibs | =3.5.2 | |
KDE kdelibs | =3.5.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-1094 is considered to be a high severity vulnerability due to the potential for man-in-the-middle attacks.
To fix CVE-2011-1094, upgrade kdelibs to version 4.6.1 or later.
CVE-2011-1094 allows man-in-the-middle attackers to spoof SSL servers.
CVE-2011-1094 affects kdelibs versions prior to 4.6.1 and specifically versions 3.5.2, 3.5.9, and 3.5.10.
CVE-2011-1094 impacts the kio/kio/tcpslavebase.cpp component of KDE KSSL.