curl and libcurl 7.27.0 through 7.35.0, when running on Windows and using the SChannel/Winssl TLS backend, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate when accessing a URL that uses a numerical IP address, which allows man-in-the-middle attackers to spoof servers via an arbitrary valid certificate.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095862 | |
http://secunia.com/advisories/57836 | third party advisory vendor advisory |
http://www.securityfocus.com/bid/66296 | vdb entry |
http://www.getchef.com/blog/2014/04/09/chef-server-11-0-12-release/ | |
http://secunia.com/advisories/59458 | third party advisory |
http://seclists.org/oss-sec/2014/q1/586 | mailing list |
http://secunia.com/advisories/57968 | third party advisory vendor advisory |
http://seclists.org/oss-sec/2014/q1/585 | mailing list |
http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/ | |
http://curl.haxx.se/docs/adv_20140326D.html | patch vendor advisory |
http://www.getchef.com/blog/2014/04/09/enterprise-chef-1-4-9-release/ | |
http://secunia.com/advisories/57966 | third party advisory vendor advisory |