Описание
libcurl 7.14.0 through 7.16.3, when built with GnuTLS support, does not check SSL/TLS certificate expiration or activation dates, which allows remote attackers to bypass certain access restrictions.
libcurl 7.14.0 through 7.16.3, when built with GnuTLS support, does not check SSL/TLS certificate expiration or activation dates, which allows remote attackers to bypass certain access restrictions.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2007-3564
- https://exchange.xforce.ibmcloud.com/vulnerabilities/35479
- http://secunia.com/advisories/26104
- http://secunia.com/advisories/26108
- http://secunia.com/advisories/26128
- http://secunia.com/advisories/26231
- http://www.curl.haxx.se/docs/adv_20070710.html
- http://www.debian.org/security/2007/dsa-1333
- http://www.securityfocus.com/bid/24938
- http://www.trustix.org/errata/2007/0023
- http://www.ubuntu.com/usn/usn-484-1
- http://www.vupen.com/english/advisories/2007/2551
EPSS
CVE ID
Связанные уязвимости
libcurl 7.14.0 through 7.16.3, when built with GnuTLS support, does not check SSL/TLS certificate expiration or activation dates, which allows remote attackers to bypass certain access restrictions.
libcurl 7.14.0 through 7.16.3, when built with GnuTLS support, does not check SSL/TLS certificate expiration or activation dates, which allows remote attackers to bypass certain access restrictions.
libcurl 7.14.0 through 7.16.3, when built with GnuTLS support, does no ...
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
EPSS