CVE-2014-0350
The Poco::Net::X509Certificate::verify method in the NetSSL library in POCO C++ Libraries before 1.4.6p4 allows man-in-the-middle attackers to spoof SSL servers via crafted DNS PTR records that are requested during comparison of a server name to a wildcard domain name in an X.509 certificate.
View on NVDSeverity
N/A
EPSS
Probability of exploitation (next 30 days): 0.0020 (0.2%)
Percentile: 41.8%
EPSS: 2026-05-06
Affects
pocoproject:poco_c\+\+_librariesTechnical description
The Poco::Net::X509Certificate::verify method in the NetSSL library in POCO C++ Libraries before 1.4.6p4 allows man-in-the-middle attackers to spoof SSL servers via crafted DNS PTR records that are requested during comparison of a server name to a wildcard domain name in an X.509 certificate.
Published: 4/26/2014, 1:55:04 AM
Last modified: 5/6/2026, 10:30:45 PM
References
- http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177471.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177573.html
- http://www.kb.cert.org/vuls/id/118748
- https://raw.githubusercontent.com/pocoproject/poco/poco-1.4.6p4-release/CHANGELOG
- http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177471.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177573.html
- http://www.kb.cert.org/vuls/id/118748
- https://raw.githubusercontent.com/pocoproject/poco/poco-1.4.6p4-release/CHANGELOG