CVE-2014-2522
18.04.2014, 22:14
curl and libcurl 7.27.0 through 7.35.0, when running on Windows and using the SChannel/Winssl TLS backend, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate when accessing a URL that uses a numerical IP address, which allows man-in-the-middle attackers to spoof servers via an arbitrary valid certificate.Enginsight
Vendor | Product | Version |
---|---|---|
haxx | curl | 7.27.0 |
haxx | curl | 7.28.0 |
haxx | curl | 7.28.1 |
haxx | curl | 7.29.0 |
haxx | curl | 7.30.0 |
haxx | curl | 7.31.0 |
haxx | curl | 7.32.0 |
haxx | curl | 7.33.0 |
haxx | curl | 7.34.0 |
haxx | curl | 7.35.0 |
haxx | libcurl | 7.27.0 |
haxx | libcurl | 7.28.0 |
haxx | libcurl | 7.28.1 |
haxx | libcurl | 7.29.0 |
haxx | libcurl | 7.30.0 |
haxx | libcurl | 7.31.0 |
haxx | libcurl | 7.32.0 |
haxx | libcurl | 7.33.0 |
haxx | libcurl | 7.34.0 |
haxx | libcurl | 7.35.0 |
haxx | libcurl | 7.36.0 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References