First published: Mon Dec 23 2013(Updated: )
The GnuTLS backend in libcurl 7.21.4 through 7.33.0, when disabling digital signature verification (CURLOPT_SSL_VERIFYPEER), also disables the CURLOPT_SSL_VERIFYHOST check for CN or SAN host name fields, which makes it easier for remote attackers to spoof servers and conduct man-in-the-middle (MITM) attacks.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Debian Debian Linux | =7.0 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =12.10 | |
Canonical Ubuntu Linux | =13.04 | |
Canonical Ubuntu Linux | =13.10 | |
Haxx Libcurl | =7.21.4 | |
Haxx Libcurl | =7.21.5 | |
Haxx Libcurl | =7.21.6 | |
Haxx Libcurl | =7.21.7 | |
Haxx Libcurl | =7.22.0 | |
Haxx Libcurl | =7.23.0 | |
Haxx Libcurl | =7.23.1 | |
Haxx Libcurl | =7.24.0 | |
Haxx Libcurl | =7.25.0 | |
Haxx Libcurl | =7.26.0 | |
Haxx Libcurl | =7.27.0 | |
Haxx Libcurl | =7.28.0 | |
Haxx Libcurl | =7.28.1 | |
Haxx Libcurl | =7.29.0 | |
Haxx Libcurl | =7.30.0 | |
Haxx Libcurl | =7.31.0 | |
Haxx Libcurl | =7.32.0 | |
Haxx Libcurl | =7.33.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.