Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Generic)  >   curl Vendors:
cURL Certificate Validation Flaw Lets Remote Users Spoof SSL Servers
SecurityTracker Alert ID:  1029434
SecurityTracker URL:
CVE Reference:   CVE-2013-4545   (Links to External Site)
Updated:  Dec 19 2013
Original Entry Date:  Dec 5 2013
Impact:   Modification of system information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 7.18.0 through 7.32.0
Description:   A vulnerability was reported in cURL. A remote user can spoof servers.

The software does not properly verify the certificate CN or SAN name field in certain cases. A remote user that can conduct a man-in-the-middle attack can spoof SSL servers.

Systems that use OpenSSL as the TLS backend are affected.

Systems with digital signature verification (CURLOPT_SSL_VERIFYPEER) disabled are affected.

Scott Cantor reported this vulnerability.

Impact:   A remote user can spoof SSL servers.
Solution:   The vendor has issued a fix (7.33.0) [in November 2013].

The vendor's advisory is available at:

Vendor URL: (Links to External Site)
Cause:   Authentication error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Apr 17 2014 (Oracle Issues Fix for Solaris) cURL Certificate Validation Flaw Lets Remote Users Spoof SSL Servers
Oracle has issued a fix for Solaris 11.1.

 Source Message Contents

[Original Message Not Available for Viewing]

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, LLC