The GnuTLS backend in libcurl 7.21.4 through 7.33.0, when disabling digital signature verification (CURLOPT_SSL_VERIFYPEER), also disables the CURLOPT_SSL_VERIFYHOST check for CN or SAN host name fields, which makes it easier for remote attackers to spoof servers and conduct man-in-the-middle (MITM) attacks.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://curl.haxx.se/docs/adv_20131217.html | vendor advisory |
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html | |
https://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04463322 | vendor advisory |
http://www.debian.org/security/2013/dsa-2824 | vendor advisory |
http://www.ubuntu.com/usn/USN-2058-1 | vendor advisory |