fkie_cve-2013-4545
Vulnerability from fkie_nvd
Published
2013-11-23 11:55
Modified
2025-04-11 00:51
Severity ?
Summary
cURL and libcurl 7.18.0 through 7.32.0, when built with OpenSSL, disables the certificate CN and SAN name field verification (CURLOPT_SSL_VERIFYHOST) when the digital signature verification (CURLOPT_SSL_VERIFYPEER) is disabled, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:haxx:curl:7.18.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7494C01F-E9EC-406E-879A-B2045865E282",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.18.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7DD9F894-4576-4ED1-9F55-4C27ECE7E058",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.18.2:*:*:*:*:*:*:*",
"matchCriteriaId": "49AFACAC-BBAF-469B-BF05-0478E987120F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.19.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6A136E86-0697-4915-BC49-F570C776EDE1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.19.1:*:*:*:*:*:*:*",
"matchCriteriaId": "ECB241AF-A01D-4FD6-B98A-F4C20F844C2F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.19.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C5B61901-F7DF-4805-8EB7-CA1701CA81CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.19.3:*:*:*:*:*:*:*",
"matchCriteriaId": "EB0CDEC9-224A-4668-B2E4-2145653E3F2D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.19.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E92BE9CB-F001-47A0-94E0-48FC01A63FE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.19.5:*:*:*:*:*:*:*",
"matchCriteriaId": "324E2A20-2F66-4E03-9A7F-A09E631E9033",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.19.6:*:*:*:*:*:*:*",
"matchCriteriaId": "C8987B53-BD80-40B9-8429-21AD97208040",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.19.7:*:*:*:*:*:*:*",
"matchCriteriaId": "490D1BDC-33B9-43BA-B6DA-42DEE577082A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B465BE7E-0B4D-4BC4-894B-3F51A201CE91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.20.1:*:*:*:*:*:*:*",
"matchCriteriaId": "CAA17087-3021-4961-B53C-CDCC872A31A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.21.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E5CA3936-4602-40E6-B75C-58D3F24268E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.21.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D87C110C-21DD-438A-90EF-BE516CF59F3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.21.2:*:*:*:*:*:*:*",
"matchCriteriaId": "AD2D9E0E-2EED-4FB5-859C-05226FC48D7E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.21.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7CA01E21-71CE-4B07-B5A6-D0D7AC493A5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.21.4:*:*:*:*:*:*:*",
"matchCriteriaId": "51239254-31CE-4BF7-8669-1525BA391362",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.21.5:*:*:*:*:*:*:*",
"matchCriteriaId": "2E2BE20D-232D-4C86-81B0-C82CCC1CAA62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.21.6:*:*:*:*:*:*:*",
"matchCriteriaId": "D652FD7C-1521-4391-AAE1-0A4D6F4CE8F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.21.7:*:*:*:*:*:*:*",
"matchCriteriaId": "DB861143-F809-45CF-95BE-E64F4BA1A0DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.22.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E3480F4A-0AE0-4428-9EDA-5A6B994909A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.23.0:*:*:*:*:*:*:*",
"matchCriteriaId": "936BF59E-33A8-46BA-9FBD-8763812E2F10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.23.1:*:*:*:*:*:*:*",
"matchCriteriaId": "33168C81-6DAE-40D6-9693-68390CD71DA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.24.0:*:*:*:*:*:*:*",
"matchCriteriaId": "424F9604-AA9A-4D45-A521-0BDEDB723659",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.25.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DC6EBCEB-E52C-4FF5-B15A-6960F58090EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.26.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D204E994-4591-403C-8EF3-D3B7BF4AA1A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.27.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EBF5418D-1162-4B1E-BC3D-06A3E084BEFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.28.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1CA65F31-3D54-4F66-A0A3-2BD993FF38F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.28.1:*:*:*:*:*:*:*",
"matchCriteriaId": "41ACC9FE-62FF-424B-B4B8-B033FEAF7686",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.29.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F8BC39E9-5945-4DC8-ACA8-1C9918D9F279",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.30.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B9658447-FBB0-4DEA-8FEE-BD4D3D1BF7FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.31.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5ECABFCB-0D02-4B5B-BB35-C6B3C0896348",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.32.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5A5176F0-E62F-46FF-B536-DC0680696773",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EEA3D88B-41B9-4D79-B47D-B3D6058C0C27",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:libcurl:7.18.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C2C80901-D48E-4C2A-9BED-A40007A11C97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*",
"matchCriteriaId": "331A51E4-AA73-486F-9618-5A83965F2436",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:libcurl:7.19.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EB32DF2C-9208-4853-ADEB-B00D764D7467",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:libcurl:7.19.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E05636DC-7E38-4605-AAB8-81C0AE37520A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:libcurl:7.19.2:*:*:*:*:*:*:*",
"matchCriteriaId": "624DF2F1-53FD-48D3-B93D-44E99C9C0C5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F2171C7C-311A-4405-B95F-3A54966FA844",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:libcurl:7.19.4:*:*:*:*:*:*:*",
"matchCriteriaId": "5DE20A41-8B53-46FC-9002-69CC7495171F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:libcurl:7.19.5:*:*:*:*:*:*:*",
"matchCriteriaId": "87ED9DA0-E880-4CBB-B1AC-5AEE8A004718",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:libcurl:7.19.6:*:*:*:*:*:*:*",
"matchCriteriaId": "5293C7F0-BF9F-4768-889A-876CE78903CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:libcurl:7.19.7:*:*:*:*:*:*:*",
"matchCriteriaId": "F3EB41B3-65F3-4B0E-8CCC-325B14AF605B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "857B244C-2AFB-40C7-A893-7C6DE9871BCE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:libcurl:7.20.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B732CE55-820A-40E0-A885-71BBB6CF8C15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:libcurl:7.21.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0455A5F2-1515-4CD8-BA2F-74D28E91A661",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:libcurl:7.21.1:*:*:*:*:*:*:*",
"matchCriteriaId": "29034B3A-BE9D-4D68-8C56-4465C03C3693",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6249538E-FBCB-4130-91FB-DA78D7BA45DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:libcurl:7.21.3:*:*:*:*:*:*:*",
"matchCriteriaId": "5E11B8A5-50A2-468F-BFB3-86DD9D28AC73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:libcurl:7.21.4:*:*:*:*:*:*:*",
"matchCriteriaId": "9EAE25A0-3828-46F1-AB30-88732CBC9F38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:libcurl:7.21.5:*:*:*:*:*:*:*",
"matchCriteriaId": "1533A85C-2160-445D-8787-E624AEDC5A0C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:libcurl:7.21.6:*:*:*:*:*:*:*",
"matchCriteriaId": "D87B9393-7EA4-43DA-900C-7E840AE2D4C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:libcurl:7.21.7:*:*:*:*:*:*:*",
"matchCriteriaId": "7D1249E9-304F-4952-8DAB-8B79CE5E7D54",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*",
"matchCriteriaId": "83FAF953-6A65-4FAB-BDB5-03B468CD1C9A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*",
"matchCriteriaId": "29F8FF1F-A639-4161-9366-62528AAF4C07",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:libcurl:7.23.1:*:*:*:*:*:*:*",
"matchCriteriaId": "812AB429-379A-4EDE-9664-5BC2989053F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:libcurl:7.24.0:*:*:*:*:*:*:*",
"matchCriteriaId": "13DD791F-C4BD-4456-955A-92E84082AA09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:libcurl:7.25.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4A17E442-45AA-4780-98B4-9BF764DCC1C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F6AF544C-5F16-4434-B9FB-93B1B7318950",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CBFD9ED9-2412-44AE-9C55-0ED03A121B23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*",
"matchCriteriaId": "67CCE31B-ABDA-4F32-BAF1-B1AD0664B3E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9E66A332-ECD1-4452-B444-FB629022FDF0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:libcurl:7.29.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CDD3D599-35E9-4590-B5E0-3AF04D344695",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:libcurl:7.30.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A3B6BFFB-7967-482C-9B49-4BD25C815299",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1791BF6D-2C96-4A6E-90D4-2906A73601F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*",
"matchCriteriaId": "260DD751-4145-4B75-B892-5FC932C6A305",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "cURL and libcurl 7.18.0 through 7.32.0, when built with OpenSSL, disables the certificate CN and SAN name field verification (CURLOPT_SSL_VERIFYHOST) when the digital signature verification (CURLOPT_SSL_VERIFYPEER) is disabled, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate."
},
{
"lang": "es",
"value": "cURL y libcurl 7.18.0 hasta la versi\u00f3n 7.32.0, cuando es compilado con OpenSSL, desactiva la verificaci\u00f3n del nombre de campos del certificado CN y SAN (CURLOPT_SSL_VERIFYHOST) cuando la verificaci\u00f3n de firma digital (CURLOPT_SSL_VERIFYPEER) est\u00e1 desactivada, lo que permite a atacantes man-in-the-middle falsificar servidores SSL a trav\u00e9s de un certificado v\u00e1lido arbitrario."
}
],
"id": "CVE-2013-4545",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2013-11-23T11:55:04.740",
"references": [
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://curl.haxx.se/docs/adv_20131115.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00047.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00053.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.debian.org/security/2013/dsa-2798"
},
{
"source": "secalert@redhat.com",
"url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.ubuntu.com/usn/USN-2048-1"
},
{
"source": "secalert@redhat.com",
"url": "https://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04463322"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://curl.haxx.se/docs/adv_20131115.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00047.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00053.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2013/dsa-2798"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.ubuntu.com/usn/USN-2048-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04463322"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-310"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…