CVE-2016-3739

EUVD-2016-4752
The (1) mbed_connect_step1 function in lib/vtls/mbedtls.c and (2) polarssl_connect_step1 function in lib/vtls/polarssl.c in cURL and libcurl before 7.49.0, when using SSLv3 or making a TLS connection to a URL that uses a numerical IP address, allow remote attackers to spoof servers via an arbitrary valid certificate.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
5.3 MEDIUM
NETWORK
HIGH
NONE
CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 77%
Affected Products (NVD)
VendorProductVersion
haxxcurl
7.21.0
haxxcurl
7.21.1
haxxcurl
7.21.2
haxxcurl
7.21.3
haxxcurl
7.21.4
haxxcurl
7.21.5
haxxcurl
7.21.6
haxxcurl
7.21.7
haxxcurl
7.22.0
haxxcurl
7.23.0
haxxcurl
7.23.1
haxxcurl
7.24.0
haxxcurl
7.25.0
haxxcurl
7.26.0
haxxcurl
7.27.0
haxxcurl
7.28.0
haxxcurl
7.28.1
haxxcurl
7.29.0
haxxcurl
7.30.0
haxxcurl
7.31.0
haxxcurl
7.32.0
haxxcurl
7.33.0
haxxcurl
7.34.0
haxxcurl
7.35.0
haxxcurl
7.36.0
haxxcurl
7.38.0
haxxcurl
7.39.0
haxxcurl
7.40.0
haxxcurl
7.41.0
haxxcurl
7.42.0
haxxcurl
7.42.1
haxxcurl
7.43.0
haxxcurl
7.44.0
haxxcurl
7.45.0
haxxcurl
7.46.0
haxxcurl
7.47.0
haxxcurl
7.48.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
curl
bookworm
7.88.1-10+deb12u7
fixed
bookworm (security)
7.88.1-10+deb12u5
fixed
bullseye
7.74.0-1.3+deb11u13
fixed
bullseye (security)
7.74.0-1.3+deb11u11
fixed
sid
8.10.1-2
fixed
trixie
8.10.1-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
curl
precise
not-affected
trusty
not-affected
wily
not-affected
xenial
not-affected