CVE-2014-8151
15.01.2015, 15:59
The darwinssl_connect_step1 function in lib/vtls/curl_darwinssl.c in libcurl 7.31.0 through 7.39.0, when using the DarwinSSL (aka SecureTransport) back-end for TLS, does not check if a cached TLS session validated the certificate when reusing the session, which allows man-in-the-middle attackers to spoof servers via a crafted certificate.Enginsight
| Vendor | Product | Version |
|---|---|---|
| apple | mac_os_x | 𝑥 ≤ 10.10.4 |
| haxx | libcurl | 7.31.0 |
| haxx | libcurl | 7.32.0 |
| haxx | libcurl | 7.33.0 |
| haxx | libcurl | 7.34.0 |
| haxx | libcurl | 7.35.0 |
| haxx | libcurl | 7.36.0 |
| haxx | libcurl | 7.37.0 |
| haxx | libcurl | 7.37.1 |
| haxx | libcurl | 7.38.0 |
| haxx | libcurl | 7.39 |
𝑥
= Vulnerable software versions
Debian Releases
Ubuntu Releases
References