libcurl.so is vulnerable to man-in-the-middle attack. A lack of validation of the TLS certificate and hostname in the mbed_connect_step1
function in lib/vtls/mbedtls.c
and polarssl_connect_step1
function in lib/vtls/polarssl.c
allows a remote attacker to spoof servers and perform man-in-the-middle attacks against the target server.
CPE | Name | Operator | Version |
---|---|---|---|
libcurl.so | le | 4.3.0 | |
curl | le | 7.30.0.2 | |
libcurl.so | le | 4.3.0 | |
curl | le | 7.30.0.2 |
www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
www.securityfocus.com/bid/90726
www.securitytracker.com/id/1035907
www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.495349
curl.haxx.se/changes.html#7_49_0
curl.haxx.se/CVE-2016-3739.patch
curl.haxx.se/docs/adv_20160518.html
curl.haxx.se/docs/CVE-2016-3739.html
h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
security.gentoo.org/glsa/201701-47