The Poco::Net::X509Certificate::verify method in the NetSSL library in POCO C++ Libraries before 1.4.6p4 allows man-in-the-middle attackers to spoof SSL servers via crafted DNS PTR records that are requested during comparison of a server name to a wildcard domain name in an X.509 certificate.
{
"binaries": [
{
"binary_version": "1.3.6p1-4+deb7u1build1",
"binary_name": "libpoco-dev"
},
{
"binary_version": "1.3.6p1-4+deb7u1build1",
"binary_name": "libpococrypto9"
},
{
"binary_version": "1.3.6p1-4+deb7u1build1",
"binary_name": "libpocodata9"
},
{
"binary_version": "1.3.6p1-4+deb7u1build1",
"binary_name": "libpocofoundation9"
},
{
"binary_version": "1.3.6p1-4+deb7u1build1",
"binary_name": "libpocomysql9"
},
{
"binary_version": "1.3.6p1-4+deb7u1build1",
"binary_name": "libpoconet9"
},
{
"binary_version": "1.3.6p1-4+deb7u1build1",
"binary_name": "libpoconetssl9"
},
{
"binary_version": "1.3.6p1-4+deb7u1build1",
"binary_name": "libpocoodbc9"
},
{
"binary_version": "1.3.6p1-4+deb7u1build1",
"binary_name": "libpocosqlite9"
},
{
"binary_version": "1.3.6p1-4+deb7u1build1",
"binary_name": "libpocoutil9"
},
{
"binary_version": "1.3.6p1-4+deb7u1build1",
"binary_name": "libpocoxml9"
},
{
"binary_version": "1.3.6p1-4+deb7u1build1",
"binary_name": "libpocozip9"
}
],
"availability": "No subscription required"
}