First published: Sat Nov 23 2013(Updated: )
cURL and libcurl 7.18.0 through 7.32.0, when built with OpenSSL, disables the certificate CN and SAN name field verification (CURLOPT_SSL_VERIFYHOST) when the digital signature verification (CURLOPT_SSL_VERIFYPEER) is disabled, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
curl | =7.18.0 | |
curl | =7.18.1 | |
curl | =7.18.2 | |
curl | =7.19.0 | |
curl | =7.19.1 | |
curl | =7.19.2 | |
curl | =7.19.3 | |
curl | =7.19.4 | |
curl | =7.19.5 | |
curl | =7.19.6 | |
curl | =7.19.7 | |
curl | =7.20.0 | |
curl | =7.20.1 | |
curl | =7.21.0 | |
curl | =7.21.1 | |
curl | =7.21.2 | |
curl | =7.21.3 | |
curl | =7.21.4 | |
curl | =7.21.5 | |
curl | =7.21.6 | |
curl | =7.21.7 | |
curl | =7.22.0 | |
curl | =7.23.0 | |
curl | =7.23.1 | |
curl | =7.24.0 | |
curl | =7.25.0 | |
curl | =7.26.0 | |
curl | =7.27.0 | |
curl | =7.28.0 | |
curl | =7.28.1 | |
curl | =7.29.0 | |
curl | =7.30.0 | |
curl | =7.31.0 | |
curl | =7.32.0 | |
libcurl | =7.18.0 | |
libcurl | =7.18.1 | |
libcurl | =7.18.2 | |
libcurl | =7.19.0 | |
libcurl | =7.19.1 | |
libcurl | =7.19.2 | |
libcurl | =7.19.3 | |
libcurl | =7.19.4 | |
libcurl | =7.19.5 | |
libcurl | =7.19.6 | |
libcurl | =7.19.7 | |
libcurl | =7.20.0 | |
libcurl | =7.20.1 | |
libcurl | =7.21.0 | |
libcurl | =7.21.1 | |
libcurl | =7.21.2 | |
libcurl | =7.21.3 | |
libcurl | =7.21.4 | |
libcurl | =7.21.5 | |
libcurl | =7.21.6 | |
libcurl | =7.21.7 | |
libcurl | =7.22.0 | |
libcurl | =7.23.0 | |
libcurl | =7.23.1 | |
libcurl | =7.24.0 | |
libcurl | =7.25.0 | |
libcurl | =7.26.0 | |
libcurl | =7.27.0 | |
libcurl | =7.28.0 | |
libcurl | =7.28.1 | |
libcurl | =7.29.0 | |
libcurl | =7.30.0 | |
libcurl | =7.31.0 | |
libcurl | =7.32.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-4545 is considered a high severity vulnerability due to its potential to allow man-in-the-middle attacks.
To fix CVE-2013-4545, upgrade cURL and libcurl to a version later than 7.32.0, where the vulnerability has been addressed.
The affected versions of cURL are from 7.18.0 to 7.32.0 when built with OpenSSL.
Yes, CVE-2013-4545 allows attackers to spoof SSL servers, compromising secure connections.
CVE-2013-4545 affects cURL configurations where CURLOPT_SSL_VERIFYHOST is disabled when CURLOPT_SSL_VERIFYPEER is also turned off.