Executive Summary
Summary | |
---|---|
Title | curl security update |
Informations | |||
---|---|---|---|
Name | DSA-2798 | First vendor Publication | 2013-11-17 |
Vendor | Debian | Last vendor Modification | 2013-11-20 |
Severity (Vendor) | N/A | Revision | 2 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:N/I:P/A:N) | |||
---|---|---|---|
Cvss Base Score | 4.3 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
The update for curl in DSA-2798-1 uncovered a regression affecting the curl command line tool behaviour (#729965). This update disables host verification too when using the --insecure option. For the oldstable distribution (squeeze), this problem has been fixed in version 7.21.0-2.1+squeeze6. For the stable distribution (wheezy), this problem has been fixed in version 7.26.0-1+wheezy6. For the testing (jessie) and unstable (sid) distributions, the curl command line tool behaves as expected with the --insecure option. For reference the original advisory text follows. Scott Cantor discovered that curl, a file retrieval tool, would disable the CURLOPT_SSLVERIFYHOST check when the CURLOPT_SSL_VERIFYPEER setting was disabled. This would also disable ssl certificate host name checks when it should have only disabled verification of the certificate trust chain. The default configuration for the curl package is not affected by this issue since CURLOPT_SSLVERIFYPEER is enabled by default. For the oldstable distribution (squeeze), this problem has been fixed in version 7.21.0-2.1+squeeze5. For the stable distribution (wheezy), this problem has been fixed in version 7.26.0-1+wheezy5. For the testing (jessie) and unstable (sid) distributions, this problem has been fixed in version 7.33.0-1. We recommend that you upgrade your curl packages. |
Original Source
Url : http://www.debian.org/security/2013/dsa-2798 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-310 | Cryptographic Issues |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:19943 | |||
Oval ID: | oval:org.mitre.oval:def:19943 | ||
Title: | DSA-2798-1 curl - unchecked ssl certificate host name | ||
Description: | Scott Cantor discovered that curl, a file retrieval tool, would disable the CURLOPT_SSLVERIFYHOST check when the CURLOPT_SSL_VERIFYPEER setting was disabled. This would also disable ssl certificate host name checks when it should have only disabled verification of the certificate trust chain. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2798-1 CVE-2013-4545 | Version: | 5 |
Platform(s): | Debian GNU/Linux 6.0 Debian GNU/Linux 7 Debian GNU/kFreeBSD 6.0 Debian GNU/kFreeBSD 7 | Product(s): | curl |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:21073 | |||
Oval ID: | oval:org.mitre.oval:def:21073 | ||
Title: | USN-2048-1 -- curl vulnerability | ||
Description: | Fraudulent security certificates could allow sensitive information to be exposed when accessing the Internet. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2048-1 CVE-2013-4545 | Version: | 5 |
Platform(s): | Ubuntu 13.10 Ubuntu 13.04 Ubuntu 12.10 Ubuntu 12.04 Ubuntu 10.04 | Product(s): | curl |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:25049 | |||
Oval ID: | oval:org.mitre.oval:def:25049 | ||
Title: | SUSE-SU-2014:0002-1 -- Security update for curl | ||
Description: | This update fixes the following security issues with curl: * bnc#849596: ssl cert checks with unclear behaviour (CVE-2013-4545) * bnc#810760: wrap tftp sequence number, fixes large files transfer Security Issue reference: * CVE-2013-4545 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4545 > | ||
Family: | unix | Class: | patch |
Reference(s): | SUSE-SU-2014:0002-1 CVE-2013-4545 | Version: | 3 |
Platform(s): | SUSE Linux Enterprise Server 11 SUSE Linux Enterprise Desktop 11 | Product(s): | curl |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:25586 | |||
Oval ID: | oval:org.mitre.oval:def:25586 | ||
Title: | SUSE-SU-2014:0004-1 -- Security update for curl | ||
Description: | This update fixes the following security issues with curl: * bnc#849596: ssl cert checks with unclear behaviour (CVE-2013-4545) Security Issue reference: * CVE-2013-4545 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4545 > | ||
Family: | unix | Class: | patch |
Reference(s): | SUSE-SU-2014:0004-1 CVE-2013-4545 | Version: | 3 |
Platform(s): | SUSE Linux Enterprise Server 11 SUSE Linux Enterprise Desktop 11 | Product(s): | curl |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:28794 | |||
Oval ID: | oval:org.mitre.oval:def:28794 | ||
Title: | DSA-2798-2 -- curl -- unchecked ssl certificate host name | ||
Description: | Scott Cantor discovered that curl, a file retrieval tool, would disable the CURLOPT_SSLVERIFYHOST check when the CURLOPT_SSL_VERIFYPEER setting was disabled. This would also disable ssl certificate host name checks when it should have only disabled verification of the certificate trust chain. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2798-2 CVE-2013-4545 | Version: | 3 |
Platform(s): | Debian GNU/Linux 6.0 Debian GNU/kFreeBSD 6.0 Debian GNU/Linux 7.0 Debian GNU/kFreeBSD 7.0 | Product(s): | curl |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2014-0004-1.nasl - Type : ACT_GATHER_INFO |
2015-04-20 | Name : The remote web server is affected by multiple vulnerabilities. File : glassfish_cpu_apr_2015.nasl - Type : ACT_GATHER_INFO |
2015-01-19 | Name : The remote Solaris system is missing a security patch for third-party software. File : solaris11_libcurl_20140415.nasl - Type : ACT_GATHER_INFO |
2014-10-08 | Name : The remote web server is affected by multiple vulnerabilities. File : hpsmh_7_4.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2013-964.nasl - Type : ACT_GATHER_INFO |
2014-01-03 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_curl-131204.nasl - Type : ACT_GATHER_INFO |
2013-12-14 | Name : The remote Fedora host is missing a security update. File : fedora_2013-22046.nasl - Type : ACT_GATHER_INFO |
2013-12-06 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2048-1.nasl - Type : ACT_GATHER_INFO |
2013-12-02 | Name : The remote Fedora host is missing a security update. File : fedora_2013-21887.nasl - Type : ACT_GATHER_INFO |
2013-11-22 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2013-276.nasl - Type : ACT_GATHER_INFO |
2013-11-21 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2798.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:32:19 |
|
2013-11-25 21:23:03 |
|
2013-11-23 17:22:44 |
|
2013-11-21 00:18:14 |
|
2013-11-17 21:18:32 |
|