Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2014-8151

Опубликовано: 15 янв. 2015
Источник: ubuntu
Приоритет: medium
CVSS2: 5.8

Описание

The darwinssl_connect_step1 function in lib/vtls/curl_darwinssl.c in libcurl 7.31.0 through 7.39.0, when using the DarwinSSL (aka SecureTransport) back-end for TLS, does not check if a cached TLS session validated the certificate when reusing the session, which allows man-in-the-middle attackers to spoof servers via a crafted certificate.

РелизСтатусПримечание
devel

not-affected

esm-infra-legacy/trusty

not-affected

lucid

not-affected

precise

not-affected

trusty

not-affected

trusty/esm

not-affected

upstream

released

7.38.0-4
utopic

not-affected

Показывать по

5.8 Medium

CVSS2

Связанные уязвимости

redhat
около 11 лет назад

The darwinssl_connect_step1 function in lib/vtls/curl_darwinssl.c in libcurl 7.31.0 through 7.39.0, when using the DarwinSSL (aka SecureTransport) back-end for TLS, does not check if a cached TLS session validated the certificate when reusing the session, which allows man-in-the-middle attackers to spoof servers via a crafted certificate.

nvd
около 11 лет назад

The darwinssl_connect_step1 function in lib/vtls/curl_darwinssl.c in libcurl 7.31.0 through 7.39.0, when using the DarwinSSL (aka SecureTransport) back-end for TLS, does not check if a cached TLS session validated the certificate when reusing the session, which allows man-in-the-middle attackers to spoof servers via a crafted certificate.

debian
около 11 лет назад

The darwinssl_connect_step1 function in lib/vtls/curl_darwinssl.c in l ...

github
больше 3 лет назад

The darwinssl_connect_step1 function in lib/vtls/curl_darwinssl.c in libcurl 7.31.0 through 7.39.0, when using the DarwinSSL (aka SecureTransport) back-end for TLS, does not check if a cached TLS session validated the certificate when reusing the session, which allows man-in-the-middle attackers to spoof servers via a crafted certificate.

5.8 Medium

CVSS2