Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2014-0139 | First vendor Publication | 2014-04-15 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:N) | |||
---|---|---|---|
Cvss Base Score | 5.8 | Attack Range | Network |
Cvss Impact Score | 4.9 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
cURL and libcurl 7.1 before 7.36.0, when using the OpenSSL, axtls, qsossl or gskit libraries for TLS, recognize a wildcard IP address in the subject's Common Name (CN) field of an X.509 certificate, which might allow man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0139 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-310 | Cryptographic Issues |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:24626 | |||
Oval ID: | oval:org.mitre.oval:def:24626 | ||
Title: | USN-2167-1 -- curl vulnerabilities | ||
Description: | Several security issues were fixed in curl. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2167-1 CVE-2014-0138 CVE-2014-0139 | Version: | 5 |
Platform(s): | Ubuntu 13.10 Ubuntu 12.10 Ubuntu 12.04 Ubuntu 10.04 | Product(s): | curl |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:24695 | |||
Oval ID: | oval:org.mitre.oval:def:24695 | ||
Title: | DSA-2902-1 curl - security update | ||
Description: | Two vulnerabilities have been discovered in cURL, an URL transfer library. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2902-1 CVE-2014-0138 CVE-2014-0139 | Version: | 5 |
Platform(s): | Debian GNU/Linux 6.0 Debian GNU/Linux 7 Debian GNU/kFreeBSD 6.0 Debian GNU/kFreeBSD 7 | Product(s): | curl |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:24940 | |||
Oval ID: | oval:org.mitre.oval:def:24940 | ||
Title: | SUSE-SU-2014:0691-1 -- Security update for curl | ||
Description: | This curl update fixes the following security issues: * bnc#868627: wrong re-use of connections (CVE-2014-0138). * bnc#868629: IP address wildcard certificate validation (CVE-2014-0139). * bnc#870444: --insecure option inappropriately enforcing security safeguard. | ||
Family: | unix | Class: | patch |
Reference(s): | SUSE-SU-2014:0691-1 CVE-2014-0138 CVE-2014-0139 | Version: | 3 |
Platform(s): | SUSE Linux Enterprise Server 11 SUSE Linux Enterprise Desktop 11 | Product(s): | curl |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:25299 | |||
Oval ID: | oval:org.mitre.oval:def:25299 | ||
Title: | SUSE-OU-2014:0571-1 -- Optional OpenSSL 1.0 versions of cyrus-sasl, libcurl4 and libldap | ||
Description: | This update includes variants of existing libraries built against OpenSSL 1.0. As OpenSSL 0.8.9j and OpenSSL 1.0.1 are not binary compatible, but have the same function names, care must be taken that they are not loaded by the same program. As some system libraries also link against libssl.so or libcrypto.so, these need to be available in variants linked against OpenSSL 1.0. These libraries are installed below the /opt/suse/ directory hierarchy. The version and the APIs of these "shadow" libraries are exactly the same as the versions in the system, and so are interchangeable. For building your OpenSSL 1.0 enabled program, link using the linkflags -L/opt/suse/lib64 -Wl, -rpath, /opt/suse/lib64 (on 32bit systems, use lib instead of lib64). This update provides variants for the OpenLDAP2 client, libcurl4 and cyrus-sasl libraries. Additionally, two bugs have been fixed in openldap2 regarding IPv6 support: * tls_checkpeer does not work with IPv6 address as Subject Alternative Name. (bnc#862623) * getaddrinfo does not return if ldap is used for host lookups on IPv6 environments. (bnc#843697) | ||
Family: | unix | Class: | patch |
Reference(s): | SUSE-OU-2014:0571-1 CVE-2014-0138 CVE-2014-0139 | Version: | 3 |
Platform(s): | SUSE Linux Enterprise Server 11 SUSE Linux Enterprise Desktop 11 | Product(s): | compat-libldap-2_3-0 libldap-2_4-2 openldap2 openldap2-back-meta openldap2-client libldap-2_4-2-32bit |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2016-03-29 | Name : The remote web server is affected by multiple vulnerabilities. File : hpsmh_7_2_6.nasl - Type : ACT_GATHER_INFO |
2015-04-30 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2015-213.nasl - Type : ACT_GATHER_INFO |
2015-03-30 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2015-098.nasl - Type : ACT_GATHER_INFO |
2015-03-12 | Name : The remote host has software installed that is affected by multiple vulnerabi... File : ibm_rational_clearquest_8_0_1_6.nasl - Type : ACT_GATHER_INFO |
2014-06-23 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201406-21.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2014-329.nasl - Type : ACT_GATHER_INFO |
2014-06-10 | Name : The remote Fedora host is missing a security update. File : fedora_2014-6912.nasl - Type : ACT_GATHER_INFO |
2014-06-10 | Name : The remote Fedora host is missing a security update. File : fedora_2014-6921.nasl - Type : ACT_GATHER_INFO |
2014-06-10 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2014-110.nasl - Type : ACT_GATHER_INFO |
2014-05-21 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_curl-140415.nasl - Type : ACT_GATHER_INFO |
2014-04-15 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2167-1.nasl - Type : ACT_GATHER_INFO |
2014-04-14 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2902.nasl - Type : ACT_GATHER_INFO |
2014-03-31 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2014-086-01.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 12:38:26 |
|
2021-05-04 12:29:21 |
|
2021-04-22 01:35:40 |
|
2020-05-23 00:39:20 |
|
2017-12-16 09:21:40 |
|
2017-01-07 09:25:16 |
|
2016-04-08 05:25:06 |
|
2016-03-30 13:26:11 |
|
2015-07-22 05:29:32 |
|
2015-07-17 09:19:19 |
|
2015-05-19 21:27:04 |
|
2015-05-14 21:27:21 |
|
2015-05-12 09:27:19 |
|
2015-05-01 13:28:23 |
|
2015-03-31 13:28:11 |
|
2015-03-13 13:24:50 |
|
2014-07-17 09:22:09 |
|
2014-06-24 13:22:31 |
|
2014-06-14 13:36:52 |
|
2014-06-11 13:24:26 |
|
2014-05-22 13:24:05 |
|
2014-04-24 13:22:41 |
|
2014-04-16 17:20:43 |
|
2014-04-16 13:24:00 |
|