libcurl 7.14.0 through 7.16.3, when built with GnuTLS support, does not check SSL/TLS certificate expiration or activation dates, which allows remote attackers to bypass certain access restrictions.
Link | Tags |
---|---|
http://secunia.com/advisories/26231 | third party advisory |
http://www.vupen.com/english/advisories/2007/2551 | vdb entry |
http://secunia.com/advisories/26128 | third party advisory |
http://secunia.com/advisories/26108 | third party advisory patch vendor advisory |
http://www.securityfocus.com/bid/24938 | vdb entry |
http://www.trustix.org/errata/2007/0023/ | vendor advisory |
http://secunia.com/advisories/26104 | third party advisory patch vendor advisory |
http://www.ubuntu.com/usn/usn-484-1 | patch vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/35479 | vdb entry |
http://www.curl.haxx.se/docs/adv_20070710.html | patch vendor advisory |
http://www.debian.org/security/2007/dsa-1333 | vendor advisory |