First published: Thu Feb 27 2014(Updated: )
curl and libcurl 7.27.0 through 7.35.0, when using the SecureTransport/Darwinssl backend, as used in in Apple OS X 10.9.x before 10.9.2, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate when accessing a URL that uses a numerical IP address, which allows man-in-the-middle attackers to spoof servers via an arbitrary valid certificate.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
macOS Yosemite | <=10.9.1 | |
macOS Yosemite | =10.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-1263 is classified as a medium severity vulnerability.
To fix CVE-2014-1263, you should update to a version of curl or libcurl that is greater than 7.35.0.
CVE-2014-1263 affects macOS Yosemite versions 10.9 to 10.9.1 using the SecureTransport/Darwinssl backend.
The impact of CVE-2014-1263 is that it allows man-in-the-middle attacks due to insufficient hostname verification.
The responsibility for addressing CVE-2014-1263 lies with users of affected versions of curl and libcurl on their macOS systems.