libcurl skips the certificate verification for a QUIC connection under certain conditions, when built to use wolfSSL. If told to use an unknown/bad cipher or curve, the error path accidentally skips the verification and returns OK, thus ignoring any certificate problems.
The product does not validate, or incorrectly validates, a certificate.
Link | Tags |
---|---|
https://curl.se/docs/CVE-2024-2379.json | vendor advisory |
https://curl.se/docs/CVE-2024-2379.html | vendor advisory |
https://hackerone.com/reports/2410774 | third party advisory issue tracking exploit |
http://www.openwall.com/lists/oss-security/2024/03/27/2 | third party advisory mailing list |
https://security.netapp.com/advisory/ntap-20240531-0001/ | third party advisory |
https://support.apple.com/kb/HT214119 | release notes vendor advisory |
https://support.apple.com/kb/HT214118 | release notes vendor advisory |
https://support.apple.com/kb/HT214120 | release notes vendor advisory |
http://seclists.org/fulldisclosure/2024/Jul/20 | third party advisory mailing list |
http://seclists.org/fulldisclosure/2024/Jul/18 | third party advisory mailing list |
http://seclists.org/fulldisclosure/2024/Jul/19 | third party advisory mailing list |