First published: Wed Jul 18 2007(Updated: )
libcurl 7.14.0 through 7.16.3, when built with GnuTLS support, does not check SSL/TLS certificate expiration or activation dates, which allows remote attackers to bypass certain access restrictions.
Credit: security@ubuntu.com
Affected Software | Affected Version | How to fix |
---|---|---|
libcurl 3 with GnuTLS support | =7.14 | |
libcurl 3 with GnuTLS support | =7.14.1 | |
libcurl 3 with GnuTLS support | =7.15 | |
libcurl 3 with GnuTLS support | =7.15.1 | |
libcurl 3 with GnuTLS support | =7.15.2 | |
libcurl 3 with GnuTLS support | =7.15.3 | |
libcurl 3 with GnuTLS support | =7.16.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2007-3564 is considered moderate, as it allows remote attackers to bypass SSL/TLS certificate checks.
To fix CVE-2007-3564, upgrade to libcurl version 7.16.4 or later, which addresses the certificate expiration and activation date issue.
Affected versions of libcurl include 7.14.0 through 7.16.3 when built with GnuTLS support.
CVE-2007-3564 exploits the lack of checks for SSL/TLS certificate expiration and activation dates in certain libcurl releases.
CVE-2007-3564 is primarily a client-side vulnerability affecting applications that use the vulnerable versions of libcurl.