Vulnerability Name:

CVE-2016-3739 (CCN-113307)

Assigned:2016-05-18
Published:2016-05-18
Updated:2018-10-17
Summary:The (1) mbed_connect_step1 function in lib/vtls/mbedtls.c and (2) polarssl_connect_step1 function in lib/vtls/polarssl.c in cURL and libcurl before 7.49.0, when using SSLv3 or making a TLS connection to a URL that uses a numerical IP address, allow remote attackers to spoof servers via an arbitrary valid certificate.
CVSS v3 Severity:5.3 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N)
4.6 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): Required
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): High
Availibility (A): None
4.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N)
3.8 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): Required
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:2.6 Low (CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
4.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-20
Vulnerability Consequences:Bypass Security
References:Source: MITRE
Type: CNA
CVE-2016-3739

Source: CCN
Type: Oracle CPUApr2017
Oracle Critical Patch Update Advisory - April 2017

Source: CONFIRM
Type: UNKNOWN
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html

Source: BID
Type: UNKNOWN
90726

Source: CCN
Type: BID-90726
cURL/libcURL CVE-2016-3739 TLS Certificate Validation Security Bypass Vulnerability

Source: SECTRACK
Type: UNKNOWN
1035907

Source: SLACKWARE
Type: UNKNOWN
SSA:2016-141-01

Source: CONFIRM
Type: UNKNOWN
https://curl.haxx.se/changes.html#7_49_0

Source: CONFIRM
Type: Vendor Advisory
https://curl.haxx.se/CVE-2016-3739.patch

Source: CCN
Type: Project cURL Security Advisory, May 18th 2016
TLS certificate check bypass with mbedTLS/PolarSSL

Source: CONFIRM
Type: Vendor Advisory
https://curl.haxx.se/docs/adv_20160518.html

Source: XF
Type: UNKNOWN
libcurl-cve20163739-sec-bypass(113307)

Source: CONFIRM
Type: UNKNOWN
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149

Source: CONFIRM
Type: UNKNOWN
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722

Source: GENTOO
Type: UNKNOWN
GLSA-201701-47

Source: CCN
Type: WhiteSource Vulnerability Database
CVE-2016-3739

Vulnerable Configuration:Configuration 1:
  • cpe:/a:haxx:curl:7.21.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.21.1:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.21.2:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.21.3:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.21.4:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.21.5:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.21.6:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.21.7:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.22.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.23.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.23.1:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.24.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.25.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.26.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.27.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.28.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.28.1:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.29.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.30.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.31.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.32.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.33.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.34.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.35.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.36.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.38.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.39.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.40.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.41.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.42.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.42.1:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.43.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.44.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.45.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.46.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.47.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.48.0:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:curl:libcurl:7.21.0:*:*:*:*:*:*:*
  • OR cpe:/a:curl:libcurl:7.22.0:*:*:*:*:*:*:*
  • OR cpe:/a:curl:libcurl:7.23.0:*:*:*:*:*:*:*
  • AND
  • cpe:/a:oracle:secure_global_desktop:5.2:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:secure_global_desktop:5.3:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:com.ubuntu.precise:def:20163739000
    V
    CVE-2016-3739 on Ubuntu 12.04 LTS (precise) - medium.
    2016-05-20
    oval:com.ubuntu.trusty:def:20163739000
    V
    CVE-2016-3739 on Ubuntu 14.04 LTS (trusty) - medium.
    2016-05-20
    oval:com.ubuntu.xenial:def:20163739000
    V
    CVE-2016-3739 on Ubuntu 16.04 LTS (xenial) - medium.
    2016-05-20
    oval:com.ubuntu.xenial:def:201637390000000
    V
    CVE-2016-3739 on Ubuntu 16.04 LTS (xenial) - medium.
    2016-05-20
    BACK
    haxx curl 7.21.0
    haxx curl 7.21.1
    haxx curl 7.21.2
    haxx curl 7.21.3
    haxx curl 7.21.4
    haxx curl 7.21.5
    haxx curl 7.21.6
    haxx curl 7.21.7
    haxx curl 7.22.0
    haxx curl 7.23.0
    haxx curl 7.23.1
    haxx curl 7.24.0
    haxx curl 7.25.0
    haxx curl 7.26.0
    haxx curl 7.27.0
    haxx curl 7.28.0
    haxx curl 7.28.1
    haxx curl 7.29.0
    haxx curl 7.30.0
    haxx curl 7.31.0
    haxx curl 7.32.0
    haxx curl 7.33.0
    haxx curl 7.34.0
    haxx curl 7.35.0
    haxx curl 7.36.0
    haxx curl 7.38.0
    haxx curl 7.39.0
    haxx curl 7.40.0
    haxx curl 7.41.0
    haxx curl 7.42.0
    haxx curl 7.42.1
    haxx curl 7.43.0
    haxx curl 7.44.0
    haxx curl 7.45.0
    haxx curl 7.46.0
    haxx curl 7.47.0
    haxx curl 7.48.0
    curl libcurl 7.21.0
    curl libcurl 7.22.0
    curl libcurl 7.23.0
    oracle secure global desktop 5.2
    oracle secure global desktop 5.3