CVE-2013-4545

cURL and libcurl 7.18.0 through 7.32.0, when built with OpenSSL, disables the certificate CN and SAN name field verification (CURLOPT_SSL_VERIFYHOST) when the digital signature verification (CURLOPT_SSL_VERIFYPEER) is disabled, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.

Published date
2013-11-23T11:55Z
Last modification date
2016-06-17T01:59Z
Assigner
secalert@redhat.com
Problem type
CWE-310
NameURLSourceTags
http://curl.haxx.se/docs/adv_20131115.htmlhttp://curl.haxx.se/docs/adv_20131115.htmlCONFIRMVendor Advisory
DSA-2798http://www.debian.org/security/2013/dsa-2798DEBIAN
openSUSE-SU-2013:1865http://lists.opensuse.org/opensuse-updates/2013-12/msg00053.htmlSUSE
openSUSE-SU-2013:1859http://lists.opensuse.org/opensuse-updates/2013-12/msg00047.htmlSUSE
USN-2048-1http://www.ubuntu.com/usn/USN-2048-1UBUNTU
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.htmlhttp://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.htmlCONFIRM
http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.htmlhttp://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.htmlCONFIRM
HPSBMU03112https://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04463322HP
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.htmlhttp://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.htmlCONFIRM