ownCloud Desktop Client before 2.0.1, when compiled with a Qt release after 5.3.x, does not call QNetworkReply::ignoreSslErrors with the list of errors to be ignored, which makes it easier for remote attackers to conduct man-in-the-middle (MITM) attacks by leveraging a server using a self-signed certificate. NOTE: this vulnerability exists because of a partial CVE-2015-4456 regression.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "2.1.1+dfsg-1ubuntu1.1", "binary_name": "libowncloudsync-dev" }, { "binary_version": "2.1.1+dfsg-1ubuntu1.1", "binary_name": "libowncloudsync0" }, { "binary_version": "2.1.1+dfsg-1ubuntu1.1", "binary_name": "libowncloudsync0-dbgsym" }, { "binary_version": "2.1.1+dfsg-1ubuntu1.1", "binary_name": "nautilus-owncloud" }, { "binary_version": "2.1.1+dfsg-1ubuntu1.1", "binary_name": "owncloud-client" }, { "binary_version": "2.1.1+dfsg-1ubuntu1.1", "binary_name": "owncloud-client-cmd" }, { "binary_version": "2.1.1+dfsg-1ubuntu1.1", "binary_name": "owncloud-client-cmd-dbgsym" }, { "binary_version": "2.1.1+dfsg-1ubuntu1.1", "binary_name": "owncloud-client-dbgsym" }, { "binary_version": "2.1.1+dfsg-1ubuntu1.1", "binary_name": "owncloud-client-doc" }, { "binary_version": "2.1.1+dfsg-1ubuntu1.1", "binary_name": "owncloud-client-l10n" } ] }