ownCloud Desktop Client before 2.0.1, when compiled with a Qt release after 5.3.x, does not call QNetworkReply::ignoreSslErrors with the list of errors to be ignored, which makes it easier for remote attackers to conduct man-in-the-middle (MITM) attacks by leveraging a server using a self-signed certificate. NOTE: this vulnerability exists because of a partial CVE-2015-4456 regression.
{ "availability": "No subscription required", "binaries": [ { "binary_name": "libowncloudsync-dev", "binary_version": "2.1.1+dfsg-1ubuntu1.1" }, { "binary_name": "libowncloudsync0", "binary_version": "2.1.1+dfsg-1ubuntu1.1" }, { "binary_name": "libowncloudsync0-dbgsym", "binary_version": "2.1.1+dfsg-1ubuntu1.1" }, { "binary_name": "nautilus-owncloud", "binary_version": "2.1.1+dfsg-1ubuntu1.1" }, { "binary_name": "owncloud-client", "binary_version": "2.1.1+dfsg-1ubuntu1.1" }, { "binary_name": "owncloud-client-cmd", "binary_version": "2.1.1+dfsg-1ubuntu1.1" }, { "binary_name": "owncloud-client-cmd-dbgsym", "binary_version": "2.1.1+dfsg-1ubuntu1.1" }, { "binary_name": "owncloud-client-dbgsym", "binary_version": "2.1.1+dfsg-1ubuntu1.1" }, { "binary_name": "owncloud-client-doc", "binary_version": "2.1.1+dfsg-1ubuntu1.1" }, { "binary_name": "owncloud-client-l10n", "binary_version": "2.1.1+dfsg-1ubuntu1.1" } ] }