ID CVE-2014-0139
Summary cURL and libcurl 7.1 before 7.36.0, when using the OpenSSL, axtls, qsossl or gskit libraries for TLS, recognize a wildcard IP address in the subject's Common Name (CN) field of an X.509 certificate, which might allow man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.
References
Vulnerable Configurations
  • Haxx Curl 7.10.6
    cpe:2.3:a:haxx:curl:7.10.6
  • Haxx Curl 7.10.7
    cpe:2.3:a:haxx:curl:7.10.7
  • Haxx Curl 7.10.8
    cpe:2.3:a:haxx:curl:7.10.8
  • Haxx Curl 7.11.0
    cpe:2.3:a:haxx:curl:7.11.0
  • Haxx Curl 7.11.1
    cpe:2.3:a:haxx:curl:7.11.1
  • Haxx Curl 7.11.2
    cpe:2.3:a:haxx:curl:7.11.2
  • Haxx Curl 7.12.0
    cpe:2.3:a:haxx:curl:7.12.0
  • Haxx Curl 7.12.1
    cpe:2.3:a:haxx:curl:7.12.1
  • Haxx Curl 7.12.2
    cpe:2.3:a:haxx:curl:7.12.2
  • Haxx Curl 7.12.3
    cpe:2.3:a:haxx:curl:7.12.3
  • Haxx Curl 7.13.0
    cpe:2.3:a:haxx:curl:7.13.0
  • Haxx Curl 7.13.1
    cpe:2.3:a:haxx:curl:7.13.1
  • Haxx Curl 7.13.2
    cpe:2.3:a:haxx:curl:7.13.2
  • Haxx Curl 7.14.0
    cpe:2.3:a:haxx:curl:7.14.0
  • Haxx Curl 7.14.1
    cpe:2.3:a:haxx:curl:7.14.1
  • Haxx Curl 7.15.0
    cpe:2.3:a:haxx:curl:7.15.0
  • Haxx Curl 7.15.1
    cpe:2.3:a:haxx:curl:7.15.1
  • Haxx Curl 7.15.2
    cpe:2.3:a:haxx:curl:7.15.2
  • Haxx Curl 7.15.3
    cpe:2.3:a:haxx:curl:7.15.3
  • Haxx Curl 7.15.4
    cpe:2.3:a:haxx:curl:7.15.4
  • Haxx Curl 7.15.5
    cpe:2.3:a:haxx:curl:7.15.5
  • Haxx Curl 7.16.0
    cpe:2.3:a:haxx:curl:7.16.0
  • Haxx Curl 7.16.1
    cpe:2.3:a:haxx:curl:7.16.1
  • Haxx Curl 7.16.2
    cpe:2.3:a:haxx:curl:7.16.2
  • Haxx Curl 7.16.3
    cpe:2.3:a:haxx:curl:7.16.3
  • Haxx Curl 7.16.4
    cpe:2.3:a:haxx:curl:7.16.4
  • Haxx Curl 7.17.0
    cpe:2.3:a:haxx:curl:7.17.0
  • Haxx Curl 7.17.1
    cpe:2.3:a:haxx:curl:7.17.1
  • Haxx Curl 7.18.0
    cpe:2.3:a:haxx:curl:7.18.0
  • Haxx Curl 7.18.1
    cpe:2.3:a:haxx:curl:7.18.1
  • Haxx Curl 7.18.2
    cpe:2.3:a:haxx:curl:7.18.2
  • Haxx Curl 7.19.0
    cpe:2.3:a:haxx:curl:7.19.0
  • Haxx Curl 7.19.1
    cpe:2.3:a:haxx:curl:7.19.1
  • Haxx Curl 7.19.2
    cpe:2.3:a:haxx:curl:7.19.2
  • Haxx Curl 7.19.3
    cpe:2.3:a:haxx:curl:7.19.3
  • Haxx Curl 7.19.4
    cpe:2.3:a:haxx:curl:7.19.4
  • Haxx Curl 7.19.5
    cpe:2.3:a:haxx:curl:7.19.5
  • Haxx Curl 7.19.6
    cpe:2.3:a:haxx:curl:7.19.6
  • Haxx Curl 7.19.7
    cpe:2.3:a:haxx:curl:7.19.7
  • Haxx Curl 7.20.0
    cpe:2.3:a:haxx:curl:7.20.0
  • Haxx Curl 7.20.1
    cpe:2.3:a:haxx:curl:7.20.1
  • Haxx Curl 7.21.0
    cpe:2.3:a:haxx:curl:7.21.0
  • Haxx Curl 7.21.1
    cpe:2.3:a:haxx:curl:7.21.1
  • Haxx Curl 7.21.2
    cpe:2.3:a:haxx:curl:7.21.2
  • Haxx Curl 7.21.3
    cpe:2.3:a:haxx:curl:7.21.3
  • Haxx Curl 7.21.4
    cpe:2.3:a:haxx:curl:7.21.4
  • Haxx Curl 7.21.5
    cpe:2.3:a:haxx:curl:7.21.5
  • Haxx Curl 7.21.6
    cpe:2.3:a:haxx:curl:7.21.6
  • Haxx Curl 7.21.7
    cpe:2.3:a:haxx:curl:7.21.7
  • Haxx Curl 7.22.0
    cpe:2.3:a:haxx:curl:7.22.0
  • Haxx Curl 7.23.0
    cpe:2.3:a:haxx:curl:7.23.0
  • Haxx Curl 7.23.1
    cpe:2.3:a:haxx:curl:7.23.1
  • Haxx Curl 7.24.0
    cpe:2.3:a:haxx:curl:7.24.0
  • Haxx Curl 7.25.0
    cpe:2.3:a:haxx:curl:7.25.0
  • Haxx Curl 7.26.0
    cpe:2.3:a:haxx:curl:7.26.0
  • Haxx Curl 7.27.0
    cpe:2.3:a:haxx:curl:7.27.0
  • Haxx Curl 7.28.0
    cpe:2.3:a:haxx:curl:7.28.0
  • Haxx Curl 7.28.1
    cpe:2.3:a:haxx:curl:7.28.1
  • Haxx Curl 7.29.0
    cpe:2.3:a:haxx:curl:7.29.0
  • Haxx Curl 7.30.0
    cpe:2.3:a:haxx:curl:7.30.0
  • Haxx Curl 7.31.0
    cpe:2.3:a:haxx:curl:7.31.0
  • Haxx Curl 7.32.0
    cpe:2.3:a:haxx:curl:7.32.0
  • Haxx Curl 7.33.0
    cpe:2.3:a:haxx:curl:7.33.0
  • Haxx Curl 7.34.0
    cpe:2.3:a:haxx:curl:7.34.0
  • Haxx Curl 7.35.0
    cpe:2.3:a:haxx:curl:7.35.0
  • Haxx libcurl 7.10.6
    cpe:2.3:a:haxx:libcurl:7.10.6
  • Haxx libcurl 7.10.7
    cpe:2.3:a:haxx:libcurl:7.10.7
  • Haxx libcurl 7.10.8
    cpe:2.3:a:haxx:libcurl:7.10.8
  • Haxx libcurl 7.11.0
    cpe:2.3:a:haxx:libcurl:7.11.0
  • Haxx libcurl 7.11.1
    cpe:2.3:a:haxx:libcurl:7.11.1
  • Haxx libcurl 7.11.2
    cpe:2.3:a:haxx:libcurl:7.11.2
  • Haxx libcurl 7.12.0
    cpe:2.3:a:haxx:libcurl:7.12.0
  • Haxx libcurl 7.12.1
    cpe:2.3:a:haxx:libcurl:7.12.1
  • Haxx libcurl 7.12.2
    cpe:2.3:a:haxx:libcurl:7.12.2
  • Haxx libcurl 7.12.3
    cpe:2.3:a:haxx:libcurl:7.12.3
  • Haxx libcurl 7.13.0
    cpe:2.3:a:haxx:libcurl:7.13.0
  • Haxx libcurl 7.13.1
    cpe:2.3:a:haxx:libcurl:7.13.1
  • Haxx libcurl 7.13.2
    cpe:2.3:a:haxx:libcurl:7.13.2
  • Haxx libcurl 7.14.0
    cpe:2.3:a:haxx:libcurl:7.14.0
  • Haxx libcurl 7.14.1
    cpe:2.3:a:haxx:libcurl:7.14.1
  • Haxx libcurl 7.15.0
    cpe:2.3:a:haxx:libcurl:7.15.0
  • Haxx libcurl 7.15.1
    cpe:2.3:a:haxx:libcurl:7.15.1
  • Haxx libcurl 7.15.2
    cpe:2.3:a:haxx:libcurl:7.15.2
  • Haxx libcurl 7.15.3
    cpe:2.3:a:haxx:libcurl:7.15.3
  • Haxx libcurl 7.15.4
    cpe:2.3:a:haxx:libcurl:7.15.4
  • Haxx libcurl 7.15.5
    cpe:2.3:a:haxx:libcurl:7.15.5
  • Haxx libcurl 7.16.0
    cpe:2.3:a:haxx:libcurl:7.16.0
  • Haxx libcurl 7.16.1
    cpe:2.3:a:haxx:libcurl:7.16.1
  • Haxx libcurl 7.16.2
    cpe:2.3:a:haxx:libcurl:7.16.2
  • Haxx libcurl 7.16.3
    cpe:2.3:a:haxx:libcurl:7.16.3
  • Haxx libcurl 7.16.4
    cpe:2.3:a:haxx:libcurl:7.16.4
  • Haxx libcurl 7.17.0
    cpe:2.3:a:haxx:libcurl:7.17.0
  • Haxx libcurl 7.17.1
    cpe:2.3:a:haxx:libcurl:7.17.1
  • Haxx libcurl 7.18.0
    cpe:2.3:a:haxx:libcurl:7.18.0
  • Haxx libcurl 7.18.1
    cpe:2.3:a:haxx:libcurl:7.18.1
  • Haxx libcurl 7.18.2
    cpe:2.3:a:haxx:libcurl:7.18.2
  • Haxx libcurl 7.19.0
    cpe:2.3:a:haxx:libcurl:7.19.0
  • Haxx libcurl 7.19.1
    cpe:2.3:a:haxx:libcurl:7.19.1
  • Haxx libcurl 7.19.2
    cpe:2.3:a:haxx:libcurl:7.19.2
  • Haxx libcurl 7.19.3
    cpe:2.3:a:haxx:libcurl:7.19.3
  • Haxx libcurl 7.19.4
    cpe:2.3:a:haxx:libcurl:7.19.4
  • Haxx libcurl 7.19.5
    cpe:2.3:a:haxx:libcurl:7.19.5
  • Haxx libcurl 7.19.6
    cpe:2.3:a:haxx:libcurl:7.19.6
  • Haxx libcurl 7.19.7
    cpe:2.3:a:haxx:libcurl:7.19.7
  • Haxx libcurl 7.20.0
    cpe:2.3:a:haxx:libcurl:7.20.0
  • Haxx libcurl 7.20.1
    cpe:2.3:a:haxx:libcurl:7.20.1
  • Haxx libcurl 7.21.0
    cpe:2.3:a:haxx:libcurl:7.21.0
  • Haxx libcurl 7.21.1
    cpe:2.3:a:haxx:libcurl:7.21.1
  • Haxx libcurl 7.21.2
    cpe:2.3:a:haxx:libcurl:7.21.2
  • Haxx libcurl 7.21.3
    cpe:2.3:a:haxx:libcurl:7.21.3
  • Haxx libcurl 7.21.4
    cpe:2.3:a:haxx:libcurl:7.21.4
  • Haxx libcurl 7.21.5
    cpe:2.3:a:haxx:libcurl:7.21.5
  • Haxx libcurl 7.21.6
    cpe:2.3:a:haxx:libcurl:7.21.6
  • Haxx libcurl 7.21.7
    cpe:2.3:a:haxx:libcurl:7.21.7
  • Haxx libcurl 7.22.0
    cpe:2.3:a:haxx:libcurl:7.22.0
  • Haxx libcurl 7.23.0
    cpe:2.3:a:haxx:libcurl:7.23.0
  • Haxx libcurl 7.23.1
    cpe:2.3:a:haxx:libcurl:7.23.1
  • Haxx libcurl 7.24.0
    cpe:2.3:a:haxx:libcurl:7.24.0
  • Haxx libcurl 7.25.0
    cpe:2.3:a:haxx:libcurl:7.25.0
  • Haxx libcurl 7.26.0
    cpe:2.3:a:haxx:libcurl:7.26.0
  • Haxx libcurl 7.27.0
    cpe:2.3:a:haxx:libcurl:7.27.0
  • Haxx libcurl 7.28.0
    cpe:2.3:a:haxx:libcurl:7.28.0
  • Haxx libcurl 7.28.1
    cpe:2.3:a:haxx:libcurl:7.28.1
  • Haxx libcurl 7.29.0
    cpe:2.3:a:haxx:libcurl:7.29.0
  • Haxx libcurl 7.30.0
    cpe:2.3:a:haxx:libcurl:7.30.0
  • Haxx libcurl 7.31.0
    cpe:2.3:a:haxx:libcurl:7.31.0
  • Haxx libcurl 7.32.0
    cpe:2.3:a:haxx:libcurl:7.32.0
  • Haxx libcurl 7.33.0
    cpe:2.3:a:haxx:libcurl:7.33.0
  • Haxx libcurl 7.34.0
    cpe:2.3:a:haxx:libcurl:7.34.0
  • Haxx libcurl 7.35.0
    cpe:2.3:a:haxx:libcurl:7.35.0
CVSS
Base: 5.8 (as of 06-04-2016 - 10:20)
Impact:
Exploitability:
CWE CWE-310
CAPEC
  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL NONE
nessus via4
  • NASL family Mandriva Local Security Checks
    NASL id MANDRIVA_MDVSA-2015-213.NASL
    description Updated lftp packages fix security vulnerability : lftp incorrectly validates wildcard SSL certificates containing literal IP addresses, so under certain conditions, it would allow and use a wildcard match specified in the CN field, allowing a malicious server to participate in a MITM attack or just fool users into believing that it is a legitimate site (CVE-2014-0139). lftp was affected by this issue as it uses code from cURL for checking SSL certificates. The curl package was fixed in MDVSA-2015:098.
    last seen 2019-02-21
    modified 2019-01-02
    plugin id 83155
    published 2015-04-30
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=83155
    title Mandriva Linux Security Advisory : lftp (MDVSA-2015:213)
  • NASL family Mandriva Local Security Checks
    NASL id MANDRIVA_MDVSA-2014-110.NASL
    description Updated curl packages fix security vulnerabilities : Paras Sethia discovered that libcurl would sometimes mix up multiple HTTP and HTTPS connections with NTLM authentication to the same server, sending requests for one user over the connection authenticated as a different user (CVE-2014-0015). libcurl can in some circumstances re-use the wrong connection when asked to do transfers using other protocols than HTTP and FTP, causing a transfer that was initiated by an application to wrongfully re-use an existing connection to the same server that was authenticated using different credentials (CVE-2014-0138). libcurl incorrectly validates wildcard SSL certificates containing literal IP addresses, so under certain conditions, it would allow and use a wildcard match specified in the CN field, allowing a malicious server to participate in a MITM attack or just fool users into believing that it is a legitimate site (CVE-2014-0139).
    last seen 2019-02-21
    modified 2018-07-19
    plugin id 74418
    published 2014-06-10
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=74418
    title Mandriva Linux Security Advisory : curl (MDVSA-2014:110)
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2014-329.NASL
    description This curl update fixes two security issues : - bnc#868627: Fixed wrong re-use of connections (CVE-2014-0138). - bnc#868629: Fixed IP address wildcard certificate validation (CVE-2014-0139).
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 75339
    published 2014-06-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=75339
    title openSUSE Security Update : curl (openSUSE-SU-2014:0598-1)
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-2167-1.NASL
    description Steve Holme discovered that libcurl incorrectly reused wrong connections when using protocols other than HTTP and FTP. This could lead to the use of unintended credentials, possibly exposing sensitive information. (CVE-2014-0138) Richard Moore discovered that libcurl incorrectly validated wildcard SSL certificates that contain literal IP addresses. An attacker could possibly exploit this to perform a man in the middle attack to view sensitive information or alter encrypted communications. (CVE-2014-0139). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-12-01
    plugin id 73514
    published 2014-04-15
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=73514
    title Ubuntu 10.04 LTS / 12.04 LTS / 12.10 / 13.10 : curl vulnerabilities (USN-2167-1)
  • NASL family Gentoo Local Security Checks
    NASL id GENTOO_GLSA-201406-21.NASL
    description The remote host is affected by the vulnerability described in GLSA-201406-21 (cURL: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in cURL. Please review the CVE identifiers referenced below for details. Impact : A remote attacker could cause a man-in-the-middle attack via a crafted certificate issued by a legitimate certification authority. Furthermore, a context-dependent attacker may be able to bypass security restrictions by connecting as other users. Workaround : There is no known workaround at this time.
    last seen 2019-02-21
    modified 2018-07-12
    plugin id 76180
    published 2014-06-23
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=76180
    title GLSA-201406-21 : cURL: Multiple vulnerabilities
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_CURL-140415.NASL
    description This curl update fixes the following security issues : - wrong re-use of connections. (CVE-2014-0138). (bnc#868627) - IP address wildcard certificate validation. (CVE-2014-0139). (bnc#868629) - --insecure option inappropriately enforcing security safeguard. (bnc#870444)
    last seen 2019-02-21
    modified 2014-12-15
    plugin id 74115
    published 2014-05-21
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=74115
    title SuSE 11.3 Security Update : curl (SAT Patch Number 9133)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2014-6912.NASL
    description - Update to 7.37.0 - Fixes CVE-2014-0138 and CVE-2014-0139 (RHBZ #1080880) Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2015-10-19
    plugin id 74406
    published 2014-06-10
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=74406
    title Fedora 20 : mingw-curl-7.37.0-1.fc20 (2014-6912)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2014-6921.NASL
    description - Update to 7.37.0 - Fixes CVE-2014-0138 and CVE-2014-0139 (RHBZ #1080880) Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2015-10-19
    plugin id 74408
    published 2014-06-10
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=74408
    title Fedora 19 : mingw-curl-7.37.0-1.fc19 (2014-6921)
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DSA-2902.NASL
    description Two vulnerabilities have been discovered in cURL, an URL transfer library. The Common Vulnerabilities and Exposures project identifies the following problems : - CVE-2014-0138 Steve Holme discovered that libcurl can in some circumstances re-use the wrong connection when asked to do transfers using other protocols than HTTP and FTP. - CVE-2014-0139 Richard Moore from Westpoint Ltd. reported that libcurl does not behave compliant to RFC 2828 under certain conditions and incorrectly validates wildcard SSL certificates containing literal IP addresses.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 73486
    published 2014-04-14
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=73486
    title Debian DSA-2902-1 : curl - security update
  • NASL family Slackware Local Security Checks
    NASL id SLACKWARE_SSA_2014-086-01.NASL
    description New curl packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1, and -current to fix security issues.
    last seen 2019-02-21
    modified 2014-12-15
    plugin id 73247
    published 2014-03-31
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=73247
    title Slackware 13.0 / 13.1 / 13.37 / 14.0 / 14.1 / current : curl (SSA:2014-086-01)
  • NASL family Mandriva Local Security Checks
    NASL id MANDRIVA_MDVSA-2015-098.NASL
    description Updated curl packages fix security vulnerabilities : Paras Sethia discovered that libcurl would sometimes mix up multiple HTTP and HTTPS connections with NTLM authentication to the same server, sending requests for one user over the connection authenticated as a different user (CVE-2014-0015). libcurl can in some circumstances re-use the wrong connection when asked to do transfers using other protocols than HTTP and FTP, causing a transfer that was initiated by an application to wrongfully re-use an existing connection to the same server that was authenticated using different credentials (CVE-2014-0138). libcurl incorrectly validates wildcard SSL certificates containing literal IP addresses, so under certain conditions, it would allow and use a wildcard match specified in the CN field, allowing a malicious server to participate in a MITM attack or just fool users into believing that it is a legitimate site (CVE-2014-0139). In cURL before 7.38.0, libcurl can be fooled to both sending cookies to wrong sites and into allowing arbitrary sites to set cookies for others. For this problem to trigger, the client application must use the numerical IP address in the URL to access the site (CVE-2014-3613). In cURL before 7.38.0, libcurl wrongly allows cookies to be set for Top Level Domains (TLDs), thus making them apply broader than cookies are allowed. This can allow arbitrary sites to set cookies that then would get sent to a different and unrelated site or domain (CVE-2014-3620). Symeon Paraschoudis discovered that the curl_easy_duphandle() function in cURL has a bug that can lead to libcurl eventually sending off sensitive data that was not intended for sending, while performing a HTTP POST operation. This bug requires CURLOPT_COPYPOSTFIELDS and curl_easy_duphandle() to be used in that order, and then the duplicate handle must be used to perform the HTTP POST. The curl command line tool is not affected by this problem as it does not use this sequence (CVE-2014-3707). When libcurl sends a request to a server via a HTTP proxy, it copies the entire URL into the request and sends if off. If the given URL contains line feeds and carriage returns those will be sent along to the proxy too, which allows the program to for example send a separate HTTP request injected embedded in the URL (CVE-2014-8150).
    last seen 2019-02-21
    modified 2018-07-19
    plugin id 82351
    published 2015-03-30
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=82351
    title Mandriva Linux Security Advisory : curl (MDVSA-2015:098)
  • NASL family Web Servers
    NASL id HPSMH_7_2_6.NASL
    description According to the web server's banner, the version of HP System Management Homepage (SMH) hosted on the remote web server is prior to 7.2.6. It is, therefore, affected by multiple vulnerabilities, including remote code execution vulnerabilities, in several components and third-party libraries : - HP SMH (XSRF) - libcurl - OpenSSL
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 90251
    published 2016-03-29
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=90251
    title HP System Management Homepage < 7.2.6 Multiple Vulnerabilities (FREAK)
  • NASL family Windows
    NASL id IBM_RATIONAL_CLEARQUEST_8_0_1_6.NASL
    description The remote host has a version of IBM Rational ClearQuest 7.1.x prior to 7.1.2.16 / 8.0.0.x prior to 8.0.0.13 / 8.0.1.x prior to 8.0.1.6 installed. It is, therefore, potentially affected by multiple vulnerabilities in third party libraries : - An error exists in the libcURL and OpenSSL libraries related to an IP address that uses a wildcard in the subject's Common Name (CN) field of an X.509 certificate. A man-in-the-middle attacker can exploit this issue to spoof SSL servers. (CVE-2014-0139) - An error exists in the OpenSSL library related to 'ec point format extension' handling and multithreaded clients that allows freed memory to be overwritten during a resumed session. (CVE-2014-3509) - An error exists in the OpenSSL library related to handling fragmented 'ClientHello' messages that allow a man-in-the-middle attacker to force usage of TLS 1.0 regardless of higher protocol levels being supported by both the server and the client. (CVE-2014-3511) - A man-in-the-middle (MitM) information disclosure vulnerability known as POODLE. The vulnerability is due to the way SSL 3.0 handles padding bytes when decrypting messages encrypted using block ciphers in cipher block chaining (CBC) mode. MitM attackers can decrypt a selected byte of a cipher text in as few as 256 tries if they are able to force a victim application to repeatedly send the same data over newly created SSL 3.0 connections. (CVE-2014-3566) - An information disclosure flaw exists in the Java library within the 'share/classes/sun/security/rsa/RSACore.java' class related to 'RSA blinding' caused during operations using private keys and measuring timing differences. This allows a remote attacker to gain information about used keys. (CVE-2014-4244) - A flaw exists in the Java library within the 'validateDHPublicKey' function in the 'share/classes/sun/security/util/KeyUtil.java' class which is triggered during the validation of Diffie-Hellman public key parameters. This allows a remote attacker to recover a key. (CVE-2014-4263) - A NULL pointer dereference error exists in the OpenSSL library related to handling Secure Remote Password protocol (SRP) that allows a malicious server to crash a client, resulting in a denial of service. (CVE-2014-5139)
    last seen 2019-02-21
    modified 2018-07-12
    plugin id 81784
    published 2015-03-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=81784
    title IBM Rational ClearQuest 7.1.x < 7.1.2.16 / 8.0.0.x < 8.0.0.13 / 8.0.1.x < 8.0.1.6 Multiple Vulnerabilities (credentialed check) (POODLE)
refmap via4
confirm
debian DSA-2902
mandriva MDVSA-2015:213
secunia
  • 57836
  • 57966
  • 57968
  • 58615
  • 59458
suse openSUSE-SU-2014:0530
ubuntu USN-2167-1
Last major update 06-01-2017 - 21:59
Published 15-04-2014 - 10:55
Last modified 15-12-2017 - 21:29
Back to Top