3 results (0.001 seconds)

CVSS: 7.5EPSS: 4%CPEs: 74EXPL: 0

14 Aug 2009 — lib/ssluse.c in cURL and libcurl 7.4 through 7.19.5, when OpenSSL is used, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408. lib/ssluse.c en cURL y libcurl v7.4 hasta v7.19.5, cuando se usa OpenSSL, no maneja de forma aecuada el caracter '\0' en un nombre de... • http://curl.haxx.se/CVE-2009-2417/curl-7.10.6-CVE-2009-2417.patch • CWE-310: Cryptographic Issues •

CVSS: 9.1EPSS: 0%CPEs: 7EXPL: 0

18 Jul 2007 — libcurl 7.14.0 through 7.16.3, when built with GnuTLS support, does not check SSL/TLS certificate expiration or activation dates, which allows remote attackers to bypass certain access restrictions. El libcurl 7.14.0 hasta el 7.16.3, cuando está construido sobre el soporte GnuTLS, no verifica la espiración del certificado SSL/TLS o las fechas de activación, lo que permite a atacantes remotos evitar ciertas restricciones de acceso. • http://secunia.com/advisories/26104 •

CVSS: 9.8EPSS: 5%CPEs: 3EXPL: 0

13 Oct 2005 — Stack-based buffer overflow in the ntlm_output function in http-ntlm.c for (1) wget 1.10, (2) curl 7.13.2, and (3) libcurl 7.13.2, and other products that use libcurl, when NTLM authentication is enabled, allows remote servers to execute arbitrary code via a long NTLM username. • ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.10/SCOSA-2006.10.txt • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •