Executive Summary

Summary
Title curl security update
Informations
Name DSA-2824 First vendor Publication 2013-12-19
Vendor Debian Last vendor Modification 2013-12-19
Severity (Vendor) N/A Revision 1

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:H/Au:N/C:P/I:P/A:N)
Cvss Base Score 4 Attack Range Network
Cvss Impact Score 4.9 Attack Complexity High
Cvss Expoit Score 4.9 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Marc Deslauriers discovered that curl, a file retrieval tool, would mistakenly skip verifying the CN and SAN name fields when digital signature verification was disabled in the libcurl GnuTLS backend.

The default configuration for the curl package is not affected by this issue since the digital signature verification is enabled by default.

The oldstable distribution (squeeze) is not affected by this problem.

For the stable distribution (wheezy), this problem has been fixed in version 7.26.0-1+wheezy7.

For the unstable distribution (sid), this problem has been fixed in version 7.34.0-1.

We recommend that you upgrade your curl packages.

Original Source

Url : http://www.debian.org/security/2013/dsa-2824

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-20 Improper Input Validation

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:20136
 
Oval ID: oval:org.mitre.oval:def:20136
Title: DSA-2824-1 curl - unchecked tls/ssl certificate host name
Description: Marc Deslauriers discovered that curl, a file retrieval tool, would mistakenly skip verifying the CN and SAN name fields when digital signature verification was disabled in the libcurl GnuTLS backend.
Family: unix Class: patch
Reference(s): DSA-2824-1
CVE-2013-6422
Version: 5
Platform(s): Debian GNU/Linux 7
Debian GNU/kFreeBSD 7
Product(s): curl
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:20581
 
Oval ID: oval:org.mitre.oval:def:20581
Title: USN-2058-1 -- curl vulnerability
Description: Fraudulent security certificates could allow sensitive information to be exposed when accessing the Internet.
Family: unix Class: patch
Reference(s): USN-2058-1
CVE-2013-6422
Version: 5
Platform(s): Ubuntu 13.10
Ubuntu 13.04
Ubuntu 12.10
Ubuntu 12.04
Product(s): curl
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 18
Os 4
Os 1

Nessus® Vulnerability Scanner

Date Description
2014-10-08 Name : The remote web server is affected by multiple vulnerabilities.
File : hpsmh_7_4.nasl - Type : ACT_GATHER_INFO
2014-01-21 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201401-14.nasl - Type : ACT_GATHER_INFO
2013-12-20 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2824.nasl - Type : ACT_GATHER_INFO
2013-12-19 Name : The remote FreeBSD host is missing a security-related update.
File : freebsd_pkg_4e1f4abc683711e39cda3c970e169bc2.nasl - Type : ACT_GATHER_INFO
2013-12-19 Name : The remote Ubuntu host is missing a security-related patch.
File : ubuntu_USN-2058-1.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
Date Informations
2014-02-17 11:32:25
  • Multiple Updates
2013-12-24 17:21:59
  • Multiple Updates
2013-12-24 13:22:15
  • Multiple Updates
2013-12-19 21:19:07
  • First insertion