First published: Thu Jan 15 2015(Updated: )
The darwinssl_connect_step1 function in lib/vtls/curl_darwinssl.c in libcurl 7.31.0 through 7.39.0, when using the DarwinSSL (aka SecureTransport) back-end for TLS, does not check if a cached TLS session validated the certificate when reusing the session, which allows man-in-the-middle attackers to spoof servers via a crafted certificate.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple Mac OS X | <=10.10.4 | |
Haxx Libcurl | =7.31.0 | |
Haxx Libcurl | =7.32.0 | |
Haxx Libcurl | =7.33.0 | |
Haxx Libcurl | =7.34.0 | |
Haxx Libcurl | =7.35.0 | |
Haxx Libcurl | =7.36.0 | |
Haxx Libcurl | =7.37.0 | |
Haxx Libcurl | =7.37.1 | |
Haxx Libcurl | =7.38.0 | |
Haxx Libcurl | =7.39 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.