First published: Mon Dec 23 2013(Updated: )
The GnuTLS backend in libcurl 7.21.4 through 7.33.0, when disabling digital signature verification (CURLOPT_SSL_VERIFYPEER), also disables the CURLOPT_SSL_VERIFYHOST check for CN or SAN host name fields, which makes it easier for remote attackers to spoof servers and conduct man-in-the-middle (MITM) attacks.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Debian Linux | =7.0 | |
Ubuntu | =12.04 | |
Ubuntu | =12.10 | |
Ubuntu | =13.04 | |
Ubuntu | =13.10 | |
libcurl | =7.21.4 | |
libcurl | =7.21.5 | |
libcurl | =7.21.6 | |
libcurl | =7.21.7 | |
libcurl | =7.22.0 | |
libcurl | =7.23.0 | |
libcurl | =7.23.1 | |
libcurl | =7.24.0 | |
libcurl | =7.25.0 | |
libcurl | =7.26.0 | |
libcurl | =7.27.0 | |
libcurl | =7.28.0 | |
libcurl | =7.28.1 | |
libcurl | =7.29.0 | |
libcurl | =7.30.0 | |
libcurl | =7.31.0 | |
libcurl | =7.32.0 | |
libcurl | =7.33.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-6422 is considered a high severity vulnerability due to the potential for man-in-the-middle attacks.
To fix CVE-2013-6422, it is recommended to upgrade to a version of libcurl later than 7.33.0.
CVE-2013-6422 affects libcurl versions from 7.21.4 to 7.33.0.
CVE-2013-6422 allows remote attackers to spoof server identities, potentially leading to unauthorized access to sensitive information.
Disabling CURLOPT_SSL_VERIFYPEER is not safe with CVE-2013-6422 as it also disables critical hostname verification checks.