Vulnerability Name: | CVE-2014-2522 (CCN-92040) |
Assigned: | 2014-03-17 |
Published: | 2014-03-17 |
Updated: | 2017-04-29 |
Summary: | curl and libcurl 7.27.0 through 7.35.0, when running on Windows and using the SChannel/Winssl TLS backend, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate when accessing a URL that uses a numerical IP address, which allows man-in-the-middle attackers to spoof servers via an arbitrary valid certificate.
|
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): None Integrity (I): Low Availibility (A): None |
|
CVSS v2 Severity: | 4.0 Medium (CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:N) 3.3 Low (Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:N/E:U/RL:U/RC:UR)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): High Authentication (Au): None | Impact Metrics: | Confidentiality (C): Partial Integrity (I): Partial Availibility (A): None | 4.3 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N) 3.5 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N/E:U/RL:U/RC:UR)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Medium Athentication (Au): None
| Impact Metrics: | Confidentiality (C): None Integrity (I): Partial Availibility (A): None |
|
Vulnerability Type: | CWE-20
|
Vulnerability Consequences: | Bypass Security |
References: | Source: CCN Type: cURL Web Site cURL
Source: CCN Type: 20140326D libcurl not verifying certs for TLS to IP address / Winssl
Source: CONFIRM Type: Patch, Vendor Advisory http://curl.haxx.se/docs/adv_20140326D.html
Source: MITRE Type: CNA CVE-2014-2522
Source: CCN Type: oss-security Mailing List, Mon, 17 Mar 2014 15:16:12 +0100 (CET) CVE request: flaw in curl's Windows SSL backend
Source: MLIST Type: UNKNOWN [oss-security] 20140317 CVE request: flaw in curl's Windows SSL backend
Source: MLIST Type: UNKNOWN [oss-security] 20140317 Re: CVE request: flaw in curl's Windows SSL backend
Source: CCN Type: SA57434 libcURL Connection Re-use and Certificate Verification Security Issues
Source: CCN Type: SA57836 Chef Multiple Vulnerabilities
Source: SECUNIA Type: Vendor Advisory 57836
Source: CCN Type: SA57966 Chef Multiple Vulnerabilities
Source: SECUNIA Type: Vendor Advisory 57966
Source: CCN Type: SA57968 Chef Multiple Vulnerabilities
Source: SECUNIA Type: Vendor Advisory 57968
Source: SECUNIA Type: UNKNOWN 59458
Source: CONFIRM Type: UNKNOWN http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095862
Source: CONFIRM Type: UNKNOWN http://www.getchef.com/blog/2014/04/09/chef-server-11-0-12-release/
Source: CONFIRM Type: UNKNOWN http://www.getchef.com/blog/2014/04/09/enterprise-chef-1-4-9-release/
Source: CONFIRM Type: UNKNOWN http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/
Source: CCN Type: IBM Security Bulletin 1680537 Multiple vulnerabilities in IBM Security AppScan Source (CVE-2014-2522, CVE-2014-3072)
Source: BID Type: UNKNOWN 66296
Source: CCN Type: BID-66296 cURL/libcURL CVE-2014-2522 SSL Certificate Validation Security Bypass Vulnerability
Source: XF Type: UNKNOWN curl-cve20142522-sec-bypass(92040)
Source: CCN Type: WhiteSource Vulnerability Database CVE-2014-2522
|
Vulnerable Configuration: | Configuration 1: cpe:/a:haxx:curl:7.27.0:*:*:*:*:*:*:*OR cpe:/a:haxx:curl:7.28.0:*:*:*:*:*:*:*OR cpe:/a:haxx:curl:7.28.1:*:*:*:*:*:*:*OR cpe:/a:haxx:curl:7.29.0:*:*:*:*:*:*:*OR cpe:/a:haxx:curl:7.30.0:*:*:*:*:*:*:*OR cpe:/a:haxx:curl:7.31.0:*:*:*:*:*:*:*OR cpe:/a:haxx:curl:7.32.0:*:*:*:*:*:*:*OR cpe:/a:haxx:curl:7.33.0:*:*:*:*:*:*:*OR cpe:/a:haxx:curl:7.34.0:*:*:*:*:*:*:*OR cpe:/a:haxx:curl:7.35.0:*:*:*:*:*:*:*OR cpe:/a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*OR cpe:/a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*OR cpe:/a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*OR cpe:/a:haxx:libcurl:7.29.0:*:*:*:*:*:*:*OR cpe:/a:haxx:libcurl:7.30.0:*:*:*:*:*:*:*OR cpe:/a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*OR cpe:/a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*OR cpe:/a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*OR cpe:/a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*OR cpe:/a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*OR cpe:/a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*AND cpe:/o:microsoft:windows:*:*:*:*:*:*:*:* Configuration CCN 1: cpe:/a:curl:curl:*:*:*:*:*:*:*:*AND cpe:/a:ibm:security_appscan_source:8.0:*:*:*:*:*:*:*OR cpe:/a:ibm:security_appscan_source:8.5:*:*:*:*:*:*:*OR cpe:/a:ibm:security_appscan_source:8.6:*:*:*:*:*:*:*OR cpe:/a:ibm:security_appscan_source:8.7:*:*:*:*:*:*:*OR cpe:/a:ibm:security_appscan_source:8.8:*:*:*:*:*:*:*OR cpe:/a:ibm:security_appscan_source:9.0:*:*:*:*:*:*:*
Denotes that component is vulnerable |
Oval Definitions |
|
BACK |