CVE-2014-8151
15.01.2015, 15:59
The darwinssl_connect_step1 function in lib/vtls/curl_darwinssl.c in libcurl 7.31.0 through 7.39.0, when using the DarwinSSL (aka SecureTransport) back-end for TLS, does not check if a cached TLS session validated the certificate when reusing the session, which allows man-in-the-middle attackers to spoof servers via a crafted certificate.Enginsight
Vendor | Product | Version |
---|---|---|
apple | mac_os_x | 𝑥 ≤ 10.10.4 |
haxx | libcurl | 7.31.0 |
haxx | libcurl | 7.32.0 |
haxx | libcurl | 7.33.0 |
haxx | libcurl | 7.34.0 |
haxx | libcurl | 7.35.0 |
haxx | libcurl | 7.36.0 |
haxx | libcurl | 7.37.0 |
haxx | libcurl | 7.37.1 |
haxx | libcurl | 7.38.0 |
haxx | libcurl | 7.39 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
References