Description Preview
Qt 5.12.2 through 5.14.2 contains a vulnerability in how it handles OpenSSL's error queue. This mishandling can cause a denial of service to QSslSocket users, as errors from one TLS session can leak into unrelated sessions, potentially causing unrelated sessions to be disconnected when any handshake fails. This issue affects unofficial builds of Mumble 1.3.0 and other products that use the affected Qt versions. Mumble 1.3.1 is not affected by this vulnerability, regardless of the Qt version being used.
Overview
The vulnerability (CVE-2020-13962) exists in Qt versions 5.12.2 through 5.14.2 and affects applications using QSslSocket. The core issue is improper management of OpenSSL's error queue, which causes errors from failed TLS handshakes to persist and affect subsequent, unrelated TLS sessions. When a handshake fails in one session, it can trigger disconnections in other, unrelated sessions, resulting in a denial of service condition. This vulnerability particularly impacts unofficial builds of Mumble 1.3.0, though the official Mumble 1.3.1 release has implemented fixes to mitigate this issue regardless of the Qt version being used.
Remediation
To remediate this vulnerability, the following actions are recommended:
- Update to Qt versions that have fixed this issue.
- If using Mumble, upgrade to version 1.3.1 or later, which contains fixes for this issue.
- For developers using Qt with OpenSSL, ensure proper error queue management by clearing the OpenSSL error queue after handling errors and before starting new TLS sessions.
- Apply the patches referenced in the GitHub pull request (https://github.com/mumble-voip/mumble/pull/4032) if you maintain a Qt-based application affected by this issue.
- Follow distribution-specific updates as mentioned in the Fedora, openSUSE, and Gentoo security advisories.
References
- Qt Bug Tracker: https://bugreports.qt.io/browse/QTBUG-83450
- Mumble Issue Tracker: https://github.com/mumble-voip/mumble/issues/3679
- Mumble Fix Pull Request: https://github.com/mumble-voip/mumble/pull/4032
- Fedora Security Advisories:
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X6EDPIIAQPVP2CHL2CHDHJ25EECA7UE/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQJDBZUYMMF4R5QQKD2HTIKQU2NSKO63/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V3IZY7LKJ6NAXQDFYFR4S7L5BBHYK53K/
- Gentoo Security Advisory: https://security.gentoo.org/glsa/202007-18
- openSUSE Security Advisory: http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00004.html
Industry ExposureMost to leastThis section illustrates the prevalence of a specific Common Vulnerabilities and Exposures (CVE) across various industries based on customer reports. The ranking displays industries from the most to least affected by this particular vulnerability, offering valuable insight into where this CVE has been most frequently observed. This information can help organizations within these sectors prioritize their security efforts, understand their relative risk exposure compared to their peers, and focus remediation strategies where they are most needed. By understanding the industry-specific impact, organizations can make more informed decisions regarding patching, resource allocation, and overall risk management related to this CVE.
This section illustrates the prevalence of a specific Common Vulnerabilities and Exposures (CVE) across various industries based on customer reports. The ranking displays industries from the most to least affected by this particular vulnerability, offering valuable insight into where this CVE has been most frequently observed. This information can help organizations within these sectors prioritize their security efforts, understand their relative risk exposure compared to their peers, and focus remediation strategies where they are most needed. By understanding the industry-specific impact, organizations can make more informed decisions regarding patching, resource allocation, and overall risk management related to this CVE.
- ManufacturingManufacturing
- Health Care & Social AssistanceHealth Care & Social Assistance
- Educational ServicesEducational Services
- InformationInformation
- Professional, Scientific, & Technical ServicesProfessional, Scientific, & Technical Services
- Other Services (except Public Administration)Other Services (except Public Administration)
- Retail TradeRetail Trade
- Transportation & WarehousingTransportation & Warehousing
- Arts, Entertainment & RecreationArts, Entertainment & Recreation
- Finance and InsuranceFinance and Insurance
- Management of Companies & EnterprisesManagement of Companies & Enterprises
- Public AdministrationPublic Administration
- Accommodation & Food ServicesAccommodation & Food Services
- Administrative, Support, Waste Management & Remediation ServicesAdministrative, Support, Waste Management & Remediation Services
- Agriculture, Forestry Fishing & HuntingAgriculture, Forestry Fishing & Hunting
- ConstructionConstruction
- MiningMining
- Real Estate Rental & LeasingReal Estate Rental & Leasing
- UtilitiesUtilities
- Wholesale TradeWholesale Trade