First published: Fri Apr 18 2014(Updated: )
curl and libcurl 7.27.0 through 7.35.0, when running on Windows and using the SChannel/Winssl TLS backend, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate when accessing a URL that uses a numerical IP address, which allows man-in-the-middle attackers to spoof servers via an arbitrary valid certificate.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
curl | =7.27.0 | |
curl | =7.28.0 | |
curl | =7.28.1 | |
curl | =7.29.0 | |
curl | =7.30.0 | |
curl | =7.31.0 | |
curl | =7.32.0 | |
curl | =7.33.0 | |
curl | =7.34.0 | |
curl | =7.35.0 | |
libcurl | =7.27.0 | |
libcurl | =7.28.0 | |
libcurl | =7.28.1 | |
libcurl | =7.29.0 | |
libcurl | =7.30.0 | |
libcurl | =7.31.0 | |
libcurl | =7.32.0 | |
libcurl | =7.33.0 | |
libcurl | =7.34.0 | |
libcurl | =7.35.0 | |
libcurl | =7.36.0 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-2522 has a medium severity rating as it affects the verification of server certificates which could allow man-in-the-middle attacks.
To fix CVE-2014-2522, update curl or libcurl to versions 7.36.0 or later where the hostname verification issue is resolved.
CVE-2014-2522 affects curl and libcurl versions 7.27.0 through 7.35.0 that use the SChannel/Winssl TLS backend on Windows.
CVE-2014-2522 can allow attackers to perform man-in-the-middle attacks by exploiting the lack of hostname verification.
CVE-2014-2522 specifically affects curl or libcurl when running on Windows with the SChannel/Winssl TLS backend.