CVE-2020-13962

Qt 5.12.2 through 5.14.2, as used in unofficial builds of Mumble 1.3.0 and other products, mishandles OpenSSL's error queue, which can cause a denial of service to QSslSocket users. Because errors leak in unrelated TLS sessions, an unrelated session may be disconnected when any handshake fails. (Mumble 1.3.1 is not affected, regardless of the Qt version.)
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00004.html Mailing List Third Party Advisory
https://bugreports.qt.io/browse/QTBUG-83450 Issue Tracking Vendor Advisory
https://github.com/mumble-voip/mumble/issues/3679 Exploit Issue Tracking Patch Third Party Advisory
https://github.com/mumble-voip/mumble/pull/4032 Patch Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4X6EDPIIAQPVP2CHL2CHDHJ25EECA7UE/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQJDBZUYMMF4R5QQKD2HTIKQU2NSKO63/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V3IZY7LKJ6NAXQDFYFR4S7L5BBHYK53K/
https://security.gentoo.org/glsa/202007-18 Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00004.html Mailing List Third Party Advisory
https://bugreports.qt.io/browse/QTBUG-83450 Issue Tracking Vendor Advisory
https://github.com/mumble-voip/mumble/issues/3679 Exploit Issue Tracking Patch Third Party Advisory
https://github.com/mumble-voip/mumble/pull/4032 Patch Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4X6EDPIIAQPVP2CHL2CHDHJ25EECA7UE/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQJDBZUYMMF4R5QQKD2HTIKQU2NSKO63/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V3IZY7LKJ6NAXQDFYFR4S7L5BBHYK53K/
https://security.gentoo.org/glsa/202007-18 Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mumble:mumble:1.3.0:-:*:*:*:*:*:*
cpe:2.3:a:qt:qt:*:*:*:*:*:*:*:*
cpe:2.3:a:qt:qt:*:*:*:*:*:*:*:*
cpe:2.3:a:qt:qt:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*

History

No history.

Information

Published : 2020-06-09 00:15

Updated : 2024-11-21 05:02


NVD link : CVE-2020-13962

Mitre link : CVE-2020-13962

CVE.ORG link : CVE-2020-13962


JSON object : View

Products Affected

qt

  • qt

mumble

  • mumble

fedoraproject

  • fedora

opensuse

  • leap