First published: Mon Mar 12 2018(Updated: )
The verify_certificate function in lib/vtls/schannel.c in libcurl 7.30.0 through 7.51.0, when built for Windows CE using the schannel TLS backend, allows remote attackers to obtain sensitive information, cause a denial of service (crash), or possibly have unspecified other impact via a wildcard certificate name, which triggers an out-of-bounds read.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
curl | >=7.30.0<=7.51.0 | |
Microsoft Windows CE | ||
All of | ||
Curl | >=7.30.0<=7.51.0 | |
Microsoft Windows Embedded |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-9953 has a high severity rating due to its potential to cause denial of service and reveal sensitive information.
To fix CVE-2016-9953, update libcurl to a version newer than 7.51.0.
CVE-2016-9953 affects libcurl versions 7.30.0 to 7.51.0 built for Windows CE.
Yes, CVE-2016-9953 allows remote attackers to exploit the vulnerability for various malicious purposes.
The verify_certificate function in schannel.c is the specific function affected by CVE-2016-9953.