CVE-2013-4545
Published: 23 November 2013
cURL and libcurl 7.18.0 through 7.32.0, when built with OpenSSL, disables the certificate CN and SAN name field verification (CURLOPT_SSL_VERIFYHOST) when the digital signature verification (CURLOPT_SSL_VERIFYPEER) is disabled, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
Notes
Author | Note |
---|---|
mdeslaur | GnuTLS backend also appears to be affected. Sent mail to curl-library list. |
Priority
Status
Package | Release | Status |
---|---|---|
curl Launchpad, Ubuntu, Debian |
lucid |
Released
(7.19.7-1ubuntu1.4)
|
precise |
Released
(7.22.0-3ubuntu4.4)
|
|
quantal |
Released
(7.27.0-1ubuntu1.5)
|
|
raring |
Released
(7.29.0-1ubuntu3.3)
|
|
saucy |
Released
(7.32.0-1ubuntu1.1)
|
|
upstream |
Released
(7.33.0-1)
|
|
Patches: upstream: https://github.com/bagder/curl/commit/3c3622b6 |