Vulnerability Name:

CVE-2014-2522 (CCN-92040)

Assigned:2014-03-17
Published:2014-03-17
Updated:2017-04-29
Summary:curl and libcurl 7.27.0 through 7.35.0, when running on Windows and using the SChannel/Winssl TLS backend, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate when accessing a URL that uses a numerical IP address, which allows man-in-the-middle attackers to spoof servers via an arbitrary valid certificate.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:4.0 Medium (CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:N)
3.3 Low (Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:N/E:U/RL:U/RC:UR)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): None
4.3 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N)
3.5 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N/E:U/RL:U/RC:UR)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-20
Vulnerability Consequences:Bypass Security
References:Source: CCN
Type: cURL Web Site
cURL

Source: CCN
Type: 20140326D
libcurl not verifying certs for TLS to IP address / Winssl

Source: CONFIRM
Type: Patch, Vendor Advisory
http://curl.haxx.se/docs/adv_20140326D.html

Source: MITRE
Type: CNA
CVE-2014-2522

Source: CCN
Type: oss-security Mailing List, Mon, 17 Mar 2014 15:16:12 +0100 (CET)
CVE request: flaw in curl's Windows SSL backend

Source: MLIST
Type: UNKNOWN
[oss-security] 20140317 CVE request: flaw in curl's Windows SSL backend

Source: MLIST
Type: UNKNOWN
[oss-security] 20140317 Re: CVE request: flaw in curl's Windows SSL backend

Source: CCN
Type: SA57434
libcURL Connection Re-use and Certificate Verification Security Issues

Source: CCN
Type: SA57836
Chef Multiple Vulnerabilities

Source: SECUNIA
Type: Vendor Advisory
57836

Source: CCN
Type: SA57966
Chef Multiple Vulnerabilities

Source: SECUNIA
Type: Vendor Advisory
57966

Source: CCN
Type: SA57968
Chef Multiple Vulnerabilities

Source: SECUNIA
Type: Vendor Advisory
57968

Source: SECUNIA
Type: UNKNOWN
59458

Source: CONFIRM
Type: UNKNOWN
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095862

Source: CONFIRM
Type: UNKNOWN
http://www.getchef.com/blog/2014/04/09/chef-server-11-0-12-release/

Source: CONFIRM
Type: UNKNOWN
http://www.getchef.com/blog/2014/04/09/enterprise-chef-1-4-9-release/

Source: CONFIRM
Type: UNKNOWN
http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/

Source: CCN
Type: IBM Security Bulletin 1680537
Multiple vulnerabilities in IBM Security AppScan Source (CVE-2014-2522, CVE-2014-3072)

Source: BID
Type: UNKNOWN
66296

Source: CCN
Type: BID-66296
cURL/libcURL CVE-2014-2522 SSL Certificate Validation Security Bypass Vulnerability

Source: XF
Type: UNKNOWN
curl-cve20142522-sec-bypass(92040)

Source: CCN
Type: WhiteSource Vulnerability Database
CVE-2014-2522

Vulnerable Configuration:Configuration 1:
  • cpe:/a:haxx:curl:7.27.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.28.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.28.1:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.29.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.30.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.31.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.32.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.33.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.34.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.35.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:libcurl:7.29.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:libcurl:7.30.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*
  • AND
  • cpe:/o:microsoft:windows:*:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:curl:curl:*:*:*:*:*:*:*:*
  • AND
  • cpe:/a:ibm:security_appscan_source:8.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:security_appscan_source:8.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:security_appscan_source:8.6:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:security_appscan_source:8.7:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:security_appscan_source:8.8:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:security_appscan_source:9.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:com.ubuntu.precise:def:20142522000
    V
    CVE-2014-2522 on Ubuntu 12.04 LTS (precise) - medium.
    2014-04-18
    BACK
    haxx curl 7.27.0
    haxx curl 7.28.0
    haxx curl 7.28.1
    haxx curl 7.29.0
    haxx curl 7.30.0
    haxx curl 7.31.0
    haxx curl 7.32.0
    haxx curl 7.33.0
    haxx curl 7.34.0
    haxx curl 7.35.0
    haxx libcurl 7.27.0
    haxx libcurl 7.28.0
    haxx libcurl 7.28.1
    haxx libcurl 7.29.0
    haxx libcurl 7.30.0
    haxx libcurl 7.31.0
    haxx libcurl 7.32.0
    haxx libcurl 7.33.0
    haxx libcurl 7.34.0
    haxx libcurl 7.35.0
    haxx libcurl 7.36.0
    microsoft windows *
    curl curl *
    ibm security appscan source 8.0
    ibm security appscan source 8.5
    ibm security appscan source 8.6
    ibm security appscan source 8.7
    ibm security appscan source 8.8
    ibm security appscan source 9.0