First published: Mon Mar 12 2018(Updated: )
The verify_certificate function in lib/vtls/schannel.c in libcurl 7.30.0 through 7.51.0, when built for Windows CE using the schannel TLS backend, makes it easier for remote attackers to conduct man-in-the-middle attacks via a crafted wildcard SAN in a server certificate, as demonstrated by "*.com."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
curl | >=7.30.0<=7.51.0 | |
Microsoft Windows CE | ||
All of | ||
Curl | >=7.30.0<=7.51.0 | |
Microsoft Windows Embedded |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-9952 has been rated as a high severity vulnerability due to its potential to facilitate man-in-the-middle attacks.
To fix CVE-2016-9952, you should upgrade libcurl to a version later than 7.51.0.
CVE-2016-9952 affects libcurl versions 7.30.0 through 7.51.0 when built for Windows CE using the schannel TLS backend.
Remote attackers can exploit CVE-2016-9952 through crafted wildcard SANs in server certificates.
CVE-2016-9952 can facilitate man-in-the-middle attacks due to improper certificate verification.