Vulnerabilites related to libcurl - libcurl
Vulnerability from fkie_nvd
Published
2007-07-18 17:30
Modified
2025-04-09 00:30
Severity ?
Summary
libcurl 7.14.0 through 7.16.3, when built with GnuTLS support, does not check SSL/TLS certificate expiration or activation dates, which allows remote attackers to bypass certain access restrictions.
References
security@ubuntu.comhttp://secunia.com/advisories/26104Patch, Vendor Advisory
security@ubuntu.comhttp://secunia.com/advisories/26108Patch, Vendor Advisory
security@ubuntu.comhttp://secunia.com/advisories/26128
security@ubuntu.comhttp://secunia.com/advisories/26231
security@ubuntu.comhttp://www.curl.haxx.se/docs/adv_20070710.htmlPatch, Vendor Advisory
security@ubuntu.comhttp://www.debian.org/security/2007/dsa-1333
security@ubuntu.comhttp://www.securityfocus.com/bid/24938
security@ubuntu.comhttp://www.trustix.org/errata/2007/0023/
security@ubuntu.comhttp://www.ubuntu.com/usn/usn-484-1Patch
security@ubuntu.comhttp://www.vupen.com/english/advisories/2007/2551
security@ubuntu.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/35479
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26104Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26108Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26128
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26231
af854a3a-2127-422b-91ae-364da2661108http://www.curl.haxx.se/docs/adv_20070710.htmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2007/dsa-1333
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/24938
af854a3a-2127-422b-91ae-364da2661108http://www.trustix.org/errata/2007/0023/
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-484-1Patch
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/2551
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/35479
Impacted products
Vendor Product Version
libcurl libcurl 7.14
libcurl libcurl 7.14.1
libcurl libcurl 7.15
libcurl libcurl 7.15.1
libcurl libcurl 7.15.2
libcurl libcurl 7.15.3
libcurl libcurl 7.16.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libcurl:libcurl:7.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACF6D258-2A8C-40C3-9171-4C4A5B22B30C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libcurl:libcurl:7.14.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DB80911-5BD5-401D-8C0A-8229A71D0804",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libcurl:libcurl:7.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE508863-DB77-41D3-A438-3F26C34703E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libcurl:libcurl:7.15.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B79E431-AD91-4269-B427-DD1169D12659",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libcurl:libcurl:7.15.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "479069C9-D3E5-4909-8368-0B0F4704810B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libcurl:libcurl:7.15.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "DADB9299-3EFA-45E6-95BD-7FE2E1B1D565",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libcurl:libcurl:7.16.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "21F93365-54FD-45D4-B878-13A53A6806A4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "libcurl 7.14.0 through 7.16.3, when built with GnuTLS support, does not check SSL/TLS certificate expiration or activation dates, which allows remote attackers to bypass certain access restrictions."
    },
    {
      "lang": "es",
      "value": "El libcurl 7.14.0 hasta el 7.16.3, cuando est\u00e1 construido sobre el soporte GnuTLS, no verifica la espiraci\u00f3n del certificado SSL/TLS o las fechas de activaci\u00f3n, lo que permite a atacantes remotos evitar ciertas restricciones de acceso."
    }
  ],
  "id": "CVE-2007-3564",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-07-18T17:30:00.000",
  "references": [
    {
      "source": "security@ubuntu.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26104"
    },
    {
      "source": "security@ubuntu.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26108"
    },
    {
      "source": "security@ubuntu.com",
      "url": "http://secunia.com/advisories/26128"
    },
    {
      "source": "security@ubuntu.com",
      "url": "http://secunia.com/advisories/26231"
    },
    {
      "source": "security@ubuntu.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.curl.haxx.se/docs/adv_20070710.html"
    },
    {
      "source": "security@ubuntu.com",
      "url": "http://www.debian.org/security/2007/dsa-1333"
    },
    {
      "source": "security@ubuntu.com",
      "url": "http://www.securityfocus.com/bid/24938"
    },
    {
      "source": "security@ubuntu.com",
      "url": "http://www.trustix.org/errata/2007/0023/"
    },
    {
      "source": "security@ubuntu.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.ubuntu.com/usn/usn-484-1"
    },
    {
      "source": "security@ubuntu.com",
      "url": "http://www.vupen.com/english/advisories/2007/2551"
    },
    {
      "source": "security@ubuntu.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35479"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26104"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26108"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26128"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26231"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.curl.haxx.se/docs/adv_20070710.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2007/dsa-1333"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/24938"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.trustix.org/errata/2007/0023/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.ubuntu.com/usn/usn-484-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/2551"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35479"
    }
  ],
  "sourceIdentifier": "security@ubuntu.com",
  "vendorComments": [
    {
      "comment": "Not vulnerable.  The curl packages as shipped with Red Hat Enterprise Linux versions 2.1, 3, 4 and 5 are not linked against the gnutls library.",
      "lastModified": "2007-07-20T00:00:00",
      "organization": "Red Hat"
    }
  ],
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2005-10-13 22:02
Modified
2025-04-03 01:03
Severity ?
Summary
Stack-based buffer overflow in the ntlm_output function in http-ntlm.c for (1) wget 1.10, (2) curl 7.13.2, and (3) libcurl 7.13.2, and other products that use libcurl, when NTLM authentication is enabled, allows remote servers to execute arbitrary code via a long NTLM username.
References
cve@mitre.orgftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.10/SCOSA-2006.10.txt
cve@mitre.orghttp://docs.info.apple.com/article.html?artnum=302847
cve@mitre.orghttp://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.html
cve@mitre.orghttp://secunia.com/advisories/17192Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/17193Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/17203Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/17208Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/17228Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/17247Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/17297Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/17320Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/17400Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/17403Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/17485Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/17813Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/17965Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/19193Vendor Advisory
cve@mitre.orghttp://securityreason.com/securityalert/82
cve@mitre.orghttp://securitytracker.com/id?1015056
cve@mitre.orghttp://securitytracker.com/id?1015057
cve@mitre.orghttp://slackware.com/security/viewer.php?l=slackware-security&y=2005&m=slackware-security.519010
cve@mitre.orghttp://www.debian.org/security/2005/dsa-919
cve@mitre.orghttp://www.gentoo.org/security/en/glsa/glsa-200510-19.xml
cve@mitre.orghttp://www.idefense.com/application/poi/display?id=322&type=vulnerabilitiesPatch, Vendor Advisory
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2005:182
cve@mitre.orghttp://www.novell.com/linux/security/advisories/2005_63_wget_curl.html
cve@mitre.orghttp://www.osvdb.org/20011
cve@mitre.orghttp://www.redhat.com/archives/fedora-announce-list/2005-December/msg00020.html
cve@mitre.orghttp://www.redhat.com/archives/fedora-announce-list/2005-October/msg00055.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2005-807.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2005-812.html
cve@mitre.orghttp://www.securityfocus.com/bid/15102
cve@mitre.orghttp://www.securityfocus.com/bid/15647
cve@mitre.orghttp://www.vupen.com/english/advisories/2005/2088Vendor Advisory
cve@mitre.orghttp://www.vupen.com/english/advisories/2005/2125Vendor Advisory
cve@mitre.orghttp://www.vupen.com/english/advisories/2005/2659Vendor Advisory
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/22721
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9810
cve@mitre.orghttps://usn.ubuntu.com/205-1/
af854a3a-2127-422b-91ae-364da2661108ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.10/SCOSA-2006.10.txt
af854a3a-2127-422b-91ae-364da2661108http://docs.info.apple.com/article.html?artnum=302847
af854a3a-2127-422b-91ae-364da2661108http://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17192Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17193Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17203Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17208Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17228Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17247Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17297Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17320Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17400Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17403Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17485Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17813Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17965Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19193Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://securityreason.com/securityalert/82
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1015056
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1015057
af854a3a-2127-422b-91ae-364da2661108http://slackware.com/security/viewer.php?l=slackware-security&y=2005&m=slackware-security.519010
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2005/dsa-919
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200510-19.xml
af854a3a-2127-422b-91ae-364da2661108http://www.idefense.com/application/poi/display?id=322&type=vulnerabilitiesPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2005:182
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2005_63_wget_curl.html
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/20011
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00020.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/archives/fedora-announce-list/2005-October/msg00055.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2005-807.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2005-812.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/15102
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/15647
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2005/2088Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2005/2125Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2005/2659Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/22721
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9810
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/205-1/
Impacted products
Vendor Product Version
curl curl 7.13.2
libcurl libcurl 7.13.2
wget wget 1.10



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:curl:curl:7.13.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2458D0E-66F7-484C-9989-308530AE766D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libcurl:libcurl:7.13.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0A61633-B9B8-44B5-B352-29F4BFBD2BD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wget:wget:1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "551786A9-941B-4FCF-A9F4-EFC560CE5316",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Stack-based buffer overflow in the ntlm_output function in http-ntlm.c for (1) wget 1.10, (2) curl 7.13.2, and (3) libcurl 7.13.2, and other products that use libcurl, when NTLM authentication is enabled, allows remote servers to execute arbitrary code via a long NTLM username."
    }
  ],
  "id": "CVE-2005-3185",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": true,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-10-13T22:02:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.10/SCOSA-2006.10.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://docs.info.apple.com/article.html?artnum=302847"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17192"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17193"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17203"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17208"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17228"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17247"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17297"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17320"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17400"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17403"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17485"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17813"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17965"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19193"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/securityalert/82"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1015056"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1015057"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2005\u0026m=slackware-security.519010"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2005/dsa-919"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200510-19.xml"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.idefense.com/application/poi/display?id=322\u0026type=vulnerabilities"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:182"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.novell.com/linux/security/advisories/2005_63_wget_curl.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/20011"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00020.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/archives/fedora-announce-list/2005-October/msg00055.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2005-807.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2005-812.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/15102"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/15647"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2005/2088"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2005/2125"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2005/2659"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22721"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9810"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://usn.ubuntu.com/205-1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.10/SCOSA-2006.10.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://docs.info.apple.com/article.html?artnum=302847"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17192"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17193"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17203"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17208"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17228"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17247"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17297"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17320"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17400"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17403"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17485"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17813"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17965"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19193"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/82"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1015056"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1015057"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2005\u0026m=slackware-security.519010"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2005/dsa-919"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200510-19.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.idefense.com/application/poi/display?id=322\u0026type=vulnerabilities"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:182"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.novell.com/linux/security/advisories/2005_63_wget_curl.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/20011"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00020.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/archives/fedora-announce-list/2005-October/msg00055.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2005-807.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2005-812.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/15102"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/15647"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2005/2088"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2005/2125"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2005/2659"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22721"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9810"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://usn.ubuntu.com/205-1/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2009-08-14 15:16
Modified
2025-04-09 00:30
Severity ?
Summary
lib/ssluse.c in cURL and libcurl 7.4 through 7.19.5, when OpenSSL is used, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
References
secalert@redhat.comhttp://curl.haxx.se/CVE-2009-2417/curl-7.10.6-CVE-2009-2417.patchPatch
secalert@redhat.comhttp://curl.haxx.se/CVE-2009-2417/curl-7.11.0-CVE-2009-2417.patchPatch
secalert@redhat.comhttp://curl.haxx.se/CVE-2009-2417/curl-7.12.1-CVE-2009-2417.patchPatch
secalert@redhat.comhttp://curl.haxx.se/CVE-2009-2417/curl-7.15.1-CVE-2009-2417.patchPatch
secalert@redhat.comhttp://curl.haxx.se/CVE-2009-2417/curl-7.15.5-CVE-2009-2417.patchPatch
secalert@redhat.comhttp://curl.haxx.se/CVE-2009-2417/curl-7.16.4-CVE-2009-2417.patchPatch, Vendor Advisory
secalert@redhat.comhttp://curl.haxx.se/CVE-2009-2417/curl-7.18.1-CVE-2009-2417.patchPatch
secalert@redhat.comhttp://curl.haxx.se/CVE-2009-2417/curl-7.19.0-CVE-2009-2417.patchPatch
secalert@redhat.comhttp://curl.haxx.se/CVE-2009-2417/curl-7.19.5-CVE-2009-2417.patchPatch
secalert@redhat.comhttp://curl.haxx.se/docs/adv_20090812.txtVendor Advisory
secalert@redhat.comhttp://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html
secalert@redhat.comhttp://secunia.com/advisories/36238Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/36475
secalert@redhat.comhttp://secunia.com/advisories/37471
secalert@redhat.comhttp://secunia.com/advisories/45047
secalert@redhat.comhttp://shibboleth.internet2.edu/secadv/secadv_20090817.txt
secalert@redhat.comhttp://support.apple.com/kb/HT4077
secalert@redhat.comhttp://wiki.rpath.com/Advisories:rPSA-2009-0124
secalert@redhat.comhttp://www.securityfocus.com/archive/1/506055/100/0/threaded
secalert@redhat.comhttp://www.securityfocus.com/archive/1/507985/100/0/threaded
secalert@redhat.comhttp://www.securityfocus.com/bid/36032
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-1158-1
secalert@redhat.comhttp://www.vmware.com/security/advisories/VMSA-2009-0016.html
secalert@redhat.comhttp://www.vupen.com/english/advisories/2009/2263Vendor Advisory
secalert@redhat.comhttp://www.vupen.com/english/advisories/2009/3316
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/52405
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10114
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8542
af854a3a-2127-422b-91ae-364da2661108http://curl.haxx.se/CVE-2009-2417/curl-7.10.6-CVE-2009-2417.patchPatch
af854a3a-2127-422b-91ae-364da2661108http://curl.haxx.se/CVE-2009-2417/curl-7.11.0-CVE-2009-2417.patchPatch
af854a3a-2127-422b-91ae-364da2661108http://curl.haxx.se/CVE-2009-2417/curl-7.12.1-CVE-2009-2417.patchPatch
af854a3a-2127-422b-91ae-364da2661108http://curl.haxx.se/CVE-2009-2417/curl-7.15.1-CVE-2009-2417.patchPatch
af854a3a-2127-422b-91ae-364da2661108http://curl.haxx.se/CVE-2009-2417/curl-7.15.5-CVE-2009-2417.patchPatch
af854a3a-2127-422b-91ae-364da2661108http://curl.haxx.se/CVE-2009-2417/curl-7.16.4-CVE-2009-2417.patchPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://curl.haxx.se/CVE-2009-2417/curl-7.18.1-CVE-2009-2417.patchPatch
af854a3a-2127-422b-91ae-364da2661108http://curl.haxx.se/CVE-2009-2417/curl-7.19.0-CVE-2009-2417.patchPatch
af854a3a-2127-422b-91ae-364da2661108http://curl.haxx.se/CVE-2009-2417/curl-7.19.5-CVE-2009-2417.patchPatch
af854a3a-2127-422b-91ae-364da2661108http://curl.haxx.se/docs/adv_20090812.txtVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/36238Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/36475
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/37471
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/45047
af854a3a-2127-422b-91ae-364da2661108http://shibboleth.internet2.edu/secadv/secadv_20090817.txt
af854a3a-2127-422b-91ae-364da2661108http://support.apple.com/kb/HT4077
af854a3a-2127-422b-91ae-364da2661108http://wiki.rpath.com/Advisories:rPSA-2009-0124
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/506055/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/507985/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/36032
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1158-1
af854a3a-2127-422b-91ae-364da2661108http://www.vmware.com/security/advisories/VMSA-2009-0016.html
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2009/2263Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2009/3316
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/52405
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10114
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8542
Impacted products
Vendor Product Version
curl libcurl 7.4
curl libcurl 7.4.1
curl libcurl 7.4.2
curl libcurl 7.5
curl libcurl 7.5.1
curl libcurl 7.5.2
curl libcurl 7.6
curl libcurl 7.6.1
curl libcurl 7.7
curl libcurl 7.7.1
curl libcurl 7.7.2
curl libcurl 7.7.3
curl libcurl 7.8
curl libcurl 7.8.1
curl libcurl 7.9
curl libcurl 7.9.1
curl libcurl 7.9.2
curl libcurl 7.9.3
curl libcurl 7.9.5
curl libcurl 7.9.6
curl libcurl 7.9.7
curl libcurl 7.9.8
curl libcurl 7.10
curl libcurl 7.10.1
curl libcurl 7.10.2
curl libcurl 7.10.3
curl libcurl 7.10.4
curl libcurl 7.10.5
curl libcurl 7.10.6
curl libcurl 7.10.7
curl libcurl 7.10.8
curl libcurl 7.11.0
curl libcurl 7.11.1
curl libcurl 7.11.2
curl libcurl 7.12
curl libcurl 7.12.0
curl libcurl 7.12.1
curl libcurl 7.12.2
curl libcurl 7.12.3
curl libcurl 7.13
curl libcurl 7.13.1
curl libcurl 7.13.2
curl libcurl 7.14
curl libcurl 7.14.1
curl libcurl 7.15
curl libcurl 7.15.1
curl libcurl 7.15.2
curl libcurl 7.15.3
curl libcurl 7.16.3
curl libcurl 7.17.0
curl libcurl 7.17.1
curl libcurl 7.18.0
curl libcurl 7.18.1
curl libcurl 7.18.2
curl libcurl 7.19.0
curl libcurl 7.19.1
curl libcurl 7.19.2
curl libcurl 7.19.3
curl libcurl 7.19.4
curl libcurl 7.19.5
libcurl libcurl 7.12
libcurl libcurl 7.12.1
libcurl libcurl 7.12.2
libcurl libcurl 7.12.3
libcurl libcurl 7.13
libcurl libcurl 7.13.1
libcurl libcurl 7.13.2
libcurl libcurl 7.14
libcurl libcurl 7.14.1
libcurl libcurl 7.15
libcurl libcurl 7.15.1
libcurl libcurl 7.15.2
libcurl libcurl 7.15.3
libcurl libcurl 7.16.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A4F46D5-85E5-4483-AD3D-207E9121FE3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C3A6114-AA64-45E0-99D7-FAB060B8657B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCCF67A1-874A-41A3-85C9-2BDCD193CE22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "4321D25E-27DE-4649-A9B7-C6295F05ABB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "25774954-E239-4337-9931-D4F6A69B42F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A000CAB-5986-4568-96C2-B7E213C77E1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "37C5745B-2FFF-4DF8-883B-417015BDDF4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "76A50325-2247-46EF-A991-70378C4D008F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "B58D1562-5A17-4124-8010-6098A204C898",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C461E700-752D-4A31-A3A4-2B758CE07704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD8B6BE8-BC9A-443D-B6C8-4B5FF2390306",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "83681317-F32A-4C73-915A-D431E8DF944C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9D9C492-5F87-4149-ACAE-948DBE35E40D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "70655CE0-63F0-402C-B335-FCFA494335C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F6A6A05-E568-46F2-B2F5-73300E4EA5BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F102275D-8116-4F65-8910-478CB8DAAE76",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D68C14C1-AFDF-4DE7-BD06-2A7FE079656D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.9.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BD860AC-DE24-4CD5-B2C9-C77BD95AAFD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.9.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "403DDE56-5FA7-4920-A905-30349E61361B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.9.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F001A45E-CFD8-4B41-9281-F01A284ECD58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.9.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "580BAB7A-3BE0-4FA1-9CAF-124F16882518",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.9.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "21AE58E9-F201-41AA-A1DC-9EB09E50459A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "C901C070-728C-41CD-8E4F-ECCB779906C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "97A1D7EA-6567-4A48-A431-EA28508D62C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.10.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6D8F50B-495E-48B3-BF9F-8E4ACA556B2C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.10.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "00F4FFF6-6AB4-4857-BDFA-12801C972708",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.10.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9987313-0256-4837-B347-6ABEF18DFCBC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.10.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "D703855E-6610-445D-B498-61CE1C763A9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.10.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA7B64A2-6779-4A01-9864-902E2C04B08B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.10.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "A07B1635-6F28-4ED4-A2AC-CD7E9549C920",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.10.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFA4392F-2582-4EFE-9450-3F12588BE981",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "53E91EAD-3813-498B-9B5C-05F1DCF75D3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.11.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CDDBC13-1646-490B-B778-DBD3BB3208C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.11.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B87F05D-C077-4929-8BBA-A7287A816470",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DEC85E8-5555-46A9-9A95-30E1497AFA09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CA22553-089B-44D2-B545-82F7AED74E25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.12.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "03060364-7DCD-4111-BF7A-BEF6AFCB3134",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.12.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "319DADFB-081B-46AA-9F7D-DD4D1C5BE26D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.12.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D9C6906-5FBD-4736-87B6-720E288E394A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "4931FF86-51B6-470A-A2E0-A1B0942D1CF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.13.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA9DA33F-A33E-483E-AE4D-4422D62C02E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.13.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5028DB2-87D5-4AD8-87D4-325C519D6CD9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "E992CDB0-A787-4F7E-AC55-13FE7C68A1D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.14.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "808143C5-108B-45BE-B626-A44F9F956018",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EBBB3F1-98BD-40D1-B09F-1924D567625A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.15.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "88D5DAE5-ABEA-4FF1-836C-BA4741F13323",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.15.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E15191F-D4E6-425C-81BE-2CD55A815B5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.15.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0407CCC0-ACAA-4B2A-99A5-DA57791057B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.16.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "248D86F7-A8E5-448D-A55A-C05278BB9822",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.17.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "295EE8FF-18BD-4F67-9045-83A5693AB783",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.17.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "249C50ED-B681-4DFB-83CD-625D703CD95F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.18.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3F060A3-FC8E-45CD-85AB-247D13A2896C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.18.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F14BB81D-841D-456C-9CAE-CC679FFAB5E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.18.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EBA081D-AB88-4895-8495-6B51EB6B5325",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.19.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8F6B4C1-B88F-4675-BAB7-66A4DFAC17AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.19.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A44CE5AD-27B6-45EB-A0B8-CF9BDB31F0E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.19.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "63984E6B-54EF-4DD6-8A5B-DD16A9A6A4B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.19.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBACF741-C988-4800-A9FF-E4836A1EE4E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.19.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "95C5A868-2EC9-4FC6-A074-E587A203A350",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.19.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "54613E59-4583-405C-9BA3-609D47B9FFEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libcurl:libcurl:7.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F7DE39A-325D-42F5-B4ED-C971725232DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libcurl:libcurl:7.12.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DEC10D0-622A-4037-9D4A-69814226CC6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libcurl:libcurl:7.12.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9D0343C-175D-44BA-BCCF-5F204C749EE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libcurl:libcurl:7.12.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "69D4C0FC-6848-4D18-98E8-4A2F4D7BECC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libcurl:libcurl:7.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E66EA58-F408-4D8B-9614-67B936B0F1FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libcurl:libcurl:7.13.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "75BED785-BD7D-4A09-9B50-77548E64916D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libcurl:libcurl:7.13.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0A61633-B9B8-44B5-B352-29F4BFBD2BD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libcurl:libcurl:7.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACF6D258-2A8C-40C3-9171-4C4A5B22B30C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libcurl:libcurl:7.14.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DB80911-5BD5-401D-8C0A-8229A71D0804",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libcurl:libcurl:7.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE508863-DB77-41D3-A438-3F26C34703E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libcurl:libcurl:7.15.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B79E431-AD91-4269-B427-DD1169D12659",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libcurl:libcurl:7.15.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "479069C9-D3E5-4909-8368-0B0F4704810B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libcurl:libcurl:7.15.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "DADB9299-3EFA-45E6-95BD-7FE2E1B1D565",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libcurl:libcurl:7.16.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "21F93365-54FD-45D4-B878-13A53A6806A4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "lib/ssluse.c in cURL and libcurl 7.4 through 7.19.5, when OpenSSL is used, does not properly handle a \u0027\\0\u0027 character in a domain name in the subject\u0027s Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408."
    },
    {
      "lang": "es",
      "value": "lib/ssluse.c en cURL y libcurl v7.4 hasta v7.19.5, cuando se usa OpenSSL, no maneja de forma aecuada el caracter \u0027\\0\u0027 en un nombre de dominio en el campo sujeto del Common Name (CN) de un certificado X.509, lo que permite a atacantes de hombre en el medio hacer un spoofing de servidores SSL a trav\u00e9s de la un certificado de una autoridad de Certificaci\u00f3n leg\u00edtima, manipulado, relativo a CVE_2009-2408."
    }
  ],
  "id": "CVE-2009-2417",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-08-14T15:16:27.390",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.10.6-CVE-2009-2417.patch"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.11.0-CVE-2009-2417.patch"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.12.1-CVE-2009-2417.patch"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.15.1-CVE-2009-2417.patch"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.15.5-CVE-2009-2417.patch"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.16.4-CVE-2009-2417.patch"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.18.1-CVE-2009-2417.patch"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.19.0-CVE-2009-2417.patch"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.19.5-CVE-2009-2417.patch"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://curl.haxx.se/docs/adv_20090812.txt"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/36238"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/36475"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/37471"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/45047"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://shibboleth.internet2.edu/secadv/secadv_20090817.txt"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://support.apple.com/kb/HT4077"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://wiki.rpath.com/Advisories:rPSA-2009-0124"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/archive/1/506055/100/0/threaded"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/36032"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ubuntu.com/usn/USN-1158-1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/2263"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2009/3316"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/52405"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10114"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8542"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.10.6-CVE-2009-2417.patch"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.11.0-CVE-2009-2417.patch"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.12.1-CVE-2009-2417.patch"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.15.1-CVE-2009-2417.patch"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.15.5-CVE-2009-2417.patch"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.16.4-CVE-2009-2417.patch"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.18.1-CVE-2009-2417.patch"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.19.0-CVE-2009-2417.patch"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.19.5-CVE-2009-2417.patch"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://curl.haxx.se/docs/adv_20090812.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/36238"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/36475"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/37471"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/45047"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://shibboleth.internet2.edu/secadv/secadv_20090817.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://support.apple.com/kb/HT4077"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://wiki.rpath.com/Advisories:rPSA-2009-0124"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/506055/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/36032"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1158-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/2263"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2009/3316"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/52405"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10114"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8542"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-310"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2005-3185 (GCVE-0-2005-3185)
Vulnerability from cvelistv5
Published
2005-10-13 04:00
Modified
2024-08-07 23:01
Severity ?
CWE
  • n/a
Summary
Stack-based buffer overflow in the ntlm_output function in http-ntlm.c for (1) wget 1.10, (2) curl 7.13.2, and (3) libcurl 7.13.2, and other products that use libcurl, when NTLM authentication is enabled, allows remote servers to execute arbitrary code via a long NTLM username.
References
http://www.idefense.com/application/poi/display?id=322&type=vulnerabilities third-party-advisory, x_refsource_IDEFENSE
http://secunia.com/advisories/17247 third-party-advisory, x_refsource_SECUNIA
http://www.redhat.com/archives/fedora-announce-list/2005-October/msg00055.html vendor-advisory, x_refsource_FEDORA
http://www.redhat.com/support/errata/RHSA-2005-812.html vendor-advisory, x_refsource_REDHAT
http://securitytracker.com/id?1015057 vdb-entry, x_refsource_SECTRACK
http://secunia.com/advisories/17813 third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/17485 third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2005/2659 vdb-entry, x_refsource_VUPEN
http://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.html vendor-advisory, x_refsource_TRUSTIX
http://www.debian.org/security/2005/dsa-919 vendor-advisory, x_refsource_DEBIAN
https://exchange.xforce.ibmcloud.com/vulnerabilities/22721 vdb-entry, x_refsource_XF
http://www.vupen.com/english/advisories/2005/2088 vdb-entry, x_refsource_VUPEN
http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00020.html vendor-advisory, x_refsource_FEDORA
http://secunia.com/advisories/17297 third-party-advisory, x_refsource_SECUNIA
http://securityreason.com/securityalert/82 third-party-advisory, x_refsource_SREASON
http://secunia.com/advisories/17193 third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/17403 third-party-advisory, x_refsource_SECUNIA
https://usn.ubuntu.com/205-1/ vendor-advisory, x_refsource_UBUNTU
http://secunia.com/advisories/17208 third-party-advisory, x_refsource_SECUNIA
http://www.novell.com/linux/security/advisories/2005_63_wget_curl.html vendor-advisory, x_refsource_SUSE
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9810 vdb-entry, signature, x_refsource_OVAL
http://docs.info.apple.com/article.html?artnum=302847 vendor-advisory, x_refsource_APPLE
http://www.securityfocus.com/bid/15102 vdb-entry, x_refsource_BID
http://secunia.com/advisories/17203 third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/17965 third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2005/2125 vdb-entry, x_refsource_VUPEN
http://www.mandriva.com/security/advisories?name=MDKSA-2005:182 vendor-advisory, x_refsource_MANDRIVA
http://secunia.com/advisories/17400 third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/17192 third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/bid/15647 vdb-entry, x_refsource_BID
http://www.gentoo.org/security/en/glsa/glsa-200510-19.xml vendor-advisory, x_refsource_GENTOO
http://securitytracker.com/id?1015056 vdb-entry, x_refsource_SECTRACK
http://www.redhat.com/support/errata/RHSA-2005-807.html vendor-advisory, x_refsource_REDHAT
http://secunia.com/advisories/19193 third-party-advisory, x_refsource_SECUNIA
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.10/SCOSA-2006.10.txt vendor-advisory, x_refsource_SCO
http://slackware.com/security/viewer.php?l=slackware-security&y=2005&m=slackware-security.519010 vendor-advisory, x_refsource_SLACKWARE
http://secunia.com/advisories/17320 third-party-advisory, x_refsource_SECUNIA
http://www.osvdb.org/20011 vdb-entry, x_refsource_OSVDB
http://secunia.com/advisories/17228 third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T23:01:59.006Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20051013 Multiple Vendor wget/curl NTLM Username Buffer Overflow Vulnerability",
            "tags": [
              "third-party-advisory",
              "x_refsource_IDEFENSE",
              "x_transferred"
            ],
            "url": "http://www.idefense.com/application/poi/display?id=322\u0026type=vulnerabilities"
          },
          {
            "name": "17247",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17247"
          },
          {
            "name": "FEDORA-2005-1000",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/archives/fedora-announce-list/2005-October/msg00055.html"
          },
          {
            "name": "RHSA-2005:812",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2005-812.html"
          },
          {
            "name": "1015057",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1015057"
          },
          {
            "name": "17813",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17813"
          },
          {
            "name": "17485",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17485"
          },
          {
            "name": "ADV-2005-2659",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2005/2659"
          },
          {
            "name": "TSLSA-2005-0059",
            "tags": [
              "vendor-advisory",
              "x_refsource_TRUSTIX",
              "x_transferred"
            ],
            "url": "http://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.html"
          },
          {
            "name": "DSA-919",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2005/dsa-919"
          },
          {
            "name": "wget-curl-ntlm-username-bo(22721)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22721"
          },
          {
            "name": "ADV-2005-2088",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2005/2088"
          },
          {
            "name": "FEDORA-2005-1129",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00020.html"
          },
          {
            "name": "17297",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17297"
          },
          {
            "name": "82",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/82"
          },
          {
            "name": "17193",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17193"
          },
          {
            "name": "17403",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17403"
          },
          {
            "name": "USN-205-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/205-1/"
          },
          {
            "name": "17208",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17208"
          },
          {
            "name": "SUSE-SA:2005:063",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://www.novell.com/linux/security/advisories/2005_63_wget_curl.html"
          },
          {
            "name": "oval:org.mitre.oval:def:9810",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9810"
          },
          {
            "name": "APPLE-SA-2005-11-29",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://docs.info.apple.com/article.html?artnum=302847"
          },
          {
            "name": "15102",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/15102"
          },
          {
            "name": "17203",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17203"
          },
          {
            "name": "17965",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17965"
          },
          {
            "name": "ADV-2005-2125",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2005/2125"
          },
          {
            "name": "MDKSA-2005:182",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:182"
          },
          {
            "name": "17400",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17400"
          },
          {
            "name": "17192",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17192"
          },
          {
            "name": "15647",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/15647"
          },
          {
            "name": "GLSA-200510-19",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-200510-19.xml"
          },
          {
            "name": "1015056",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1015056"
          },
          {
            "name": "RHSA-2005:807",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2005-807.html"
          },
          {
            "name": "19193",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19193"
          },
          {
            "name": "SCOSA-2006.10",
            "tags": [
              "vendor-advisory",
              "x_refsource_SCO",
              "x_transferred"
            ],
            "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.10/SCOSA-2006.10.txt"
          },
          {
            "name": "SSA:2005-310-01",
            "tags": [
              "vendor-advisory",
              "x_refsource_SLACKWARE",
              "x_transferred"
            ],
            "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2005\u0026m=slackware-security.519010"
          },
          {
            "name": "17320",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17320"
          },
          {
            "name": "20011",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/20011"
          },
          {
            "name": "17228",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17228"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-10-13T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack-based buffer overflow in the ntlm_output function in http-ntlm.c for (1) wget 1.10, (2) curl 7.13.2, and (3) libcurl 7.13.2, and other products that use libcurl, when NTLM authentication is enabled, allows remote servers to execute arbitrary code via a long NTLM username."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-03T20:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20051013 Multiple Vendor wget/curl NTLM Username Buffer Overflow Vulnerability",
          "tags": [
            "third-party-advisory",
            "x_refsource_IDEFENSE"
          ],
          "url": "http://www.idefense.com/application/poi/display?id=322\u0026type=vulnerabilities"
        },
        {
          "name": "17247",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17247"
        },
        {
          "name": "FEDORA-2005-1000",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://www.redhat.com/archives/fedora-announce-list/2005-October/msg00055.html"
        },
        {
          "name": "RHSA-2005:812",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2005-812.html"
        },
        {
          "name": "1015057",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1015057"
        },
        {
          "name": "17813",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17813"
        },
        {
          "name": "17485",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17485"
        },
        {
          "name": "ADV-2005-2659",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2005/2659"
        },
        {
          "name": "TSLSA-2005-0059",
          "tags": [
            "vendor-advisory",
            "x_refsource_TRUSTIX"
          ],
          "url": "http://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.html"
        },
        {
          "name": "DSA-919",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2005/dsa-919"
        },
        {
          "name": "wget-curl-ntlm-username-bo(22721)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22721"
        },
        {
          "name": "ADV-2005-2088",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2005/2088"
        },
        {
          "name": "FEDORA-2005-1129",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00020.html"
        },
        {
          "name": "17297",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17297"
        },
        {
          "name": "82",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/82"
        },
        {
          "name": "17193",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17193"
        },
        {
          "name": "17403",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17403"
        },
        {
          "name": "USN-205-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://usn.ubuntu.com/205-1/"
        },
        {
          "name": "17208",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17208"
        },
        {
          "name": "SUSE-SA:2005:063",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://www.novell.com/linux/security/advisories/2005_63_wget_curl.html"
        },
        {
          "name": "oval:org.mitre.oval:def:9810",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9810"
        },
        {
          "name": "APPLE-SA-2005-11-29",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://docs.info.apple.com/article.html?artnum=302847"
        },
        {
          "name": "15102",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/15102"
        },
        {
          "name": "17203",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17203"
        },
        {
          "name": "17965",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17965"
        },
        {
          "name": "ADV-2005-2125",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2005/2125"
        },
        {
          "name": "MDKSA-2005:182",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:182"
        },
        {
          "name": "17400",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17400"
        },
        {
          "name": "17192",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17192"
        },
        {
          "name": "15647",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/15647"
        },
        {
          "name": "GLSA-200510-19",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-200510-19.xml"
        },
        {
          "name": "1015056",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1015056"
        },
        {
          "name": "RHSA-2005:807",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2005-807.html"
        },
        {
          "name": "19193",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19193"
        },
        {
          "name": "SCOSA-2006.10",
          "tags": [
            "vendor-advisory",
            "x_refsource_SCO"
          ],
          "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.10/SCOSA-2006.10.txt"
        },
        {
          "name": "SSA:2005-310-01",
          "tags": [
            "vendor-advisory",
            "x_refsource_SLACKWARE"
          ],
          "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2005\u0026m=slackware-security.519010"
        },
        {
          "name": "17320",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17320"
        },
        {
          "name": "20011",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/20011"
        },
        {
          "name": "17228",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17228"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-3185",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Stack-based buffer overflow in the ntlm_output function in http-ntlm.c for (1) wget 1.10, (2) curl 7.13.2, and (3) libcurl 7.13.2, and other products that use libcurl, when NTLM authentication is enabled, allows remote servers to execute arbitrary code via a long NTLM username."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20051013 Multiple Vendor wget/curl NTLM Username Buffer Overflow Vulnerability",
              "refsource": "IDEFENSE",
              "url": "http://www.idefense.com/application/poi/display?id=322\u0026type=vulnerabilities"
            },
            {
              "name": "17247",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17247"
            },
            {
              "name": "FEDORA-2005-1000",
              "refsource": "FEDORA",
              "url": "http://www.redhat.com/archives/fedora-announce-list/2005-October/msg00055.html"
            },
            {
              "name": "RHSA-2005:812",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2005-812.html"
            },
            {
              "name": "1015057",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1015057"
            },
            {
              "name": "17813",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17813"
            },
            {
              "name": "17485",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17485"
            },
            {
              "name": "ADV-2005-2659",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2005/2659"
            },
            {
              "name": "TSLSA-2005-0059",
              "refsource": "TRUSTIX",
              "url": "http://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.html"
            },
            {
              "name": "DSA-919",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2005/dsa-919"
            },
            {
              "name": "wget-curl-ntlm-username-bo(22721)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22721"
            },
            {
              "name": "ADV-2005-2088",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2005/2088"
            },
            {
              "name": "FEDORA-2005-1129",
              "refsource": "FEDORA",
              "url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00020.html"
            },
            {
              "name": "17297",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17297"
            },
            {
              "name": "82",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/82"
            },
            {
              "name": "17193",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17193"
            },
            {
              "name": "17403",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17403"
            },
            {
              "name": "USN-205-1",
              "refsource": "UBUNTU",
              "url": "https://usn.ubuntu.com/205-1/"
            },
            {
              "name": "17208",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17208"
            },
            {
              "name": "SUSE-SA:2005:063",
              "refsource": "SUSE",
              "url": "http://www.novell.com/linux/security/advisories/2005_63_wget_curl.html"
            },
            {
              "name": "oval:org.mitre.oval:def:9810",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9810"
            },
            {
              "name": "APPLE-SA-2005-11-29",
              "refsource": "APPLE",
              "url": "http://docs.info.apple.com/article.html?artnum=302847"
            },
            {
              "name": "15102",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/15102"
            },
            {
              "name": "17203",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17203"
            },
            {
              "name": "17965",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17965"
            },
            {
              "name": "ADV-2005-2125",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2005/2125"
            },
            {
              "name": "MDKSA-2005:182",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:182"
            },
            {
              "name": "17400",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17400"
            },
            {
              "name": "17192",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17192"
            },
            {
              "name": "15647",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/15647"
            },
            {
              "name": "GLSA-200510-19",
              "refsource": "GENTOO",
              "url": "http://www.gentoo.org/security/en/glsa/glsa-200510-19.xml"
            },
            {
              "name": "1015056",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1015056"
            },
            {
              "name": "RHSA-2005:807",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2005-807.html"
            },
            {
              "name": "19193",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19193"
            },
            {
              "name": "SCOSA-2006.10",
              "refsource": "SCO",
              "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.10/SCOSA-2006.10.txt"
            },
            {
              "name": "SSA:2005-310-01",
              "refsource": "SLACKWARE",
              "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2005\u0026m=slackware-security.519010"
            },
            {
              "name": "17320",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17320"
            },
            {
              "name": "20011",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/20011"
            },
            {
              "name": "17228",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17228"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-3185",
    "datePublished": "2005-10-13T04:00:00",
    "dateReserved": "2005-10-12T00:00:00",
    "dateUpdated": "2024-08-07T23:01:59.006Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2007-3564 (GCVE-0-2007-3564)
Vulnerability from cvelistv5
Published
2007-07-18 17:00
Modified
2024-08-07 14:21
Severity ?
CWE
  • n/a
Summary
libcurl 7.14.0 through 7.16.3, when built with GnuTLS support, does not check SSL/TLS certificate expiration or activation dates, which allows remote attackers to bypass certain access restrictions.
References
http://secunia.com/advisories/26231 third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2007/2551 vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/26128 third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/26108 third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/bid/24938 vdb-entry, x_refsource_BID
http://www.trustix.org/errata/2007/0023/ vendor-advisory, x_refsource_TRUSTIX
http://secunia.com/advisories/26104 third-party-advisory, x_refsource_SECUNIA
http://www.ubuntu.com/usn/usn-484-1 vendor-advisory, x_refsource_UBUNTU
https://exchange.xforce.ibmcloud.com/vulnerabilities/35479 vdb-entry, x_refsource_XF
http://www.curl.haxx.se/docs/adv_20070710.html x_refsource_MISC
http://www.debian.org/security/2007/dsa-1333 vendor-advisory, x_refsource_DEBIAN
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T14:21:36.293Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "26231",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26231"
          },
          {
            "name": "ADV-2007-2551",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/2551"
          },
          {
            "name": "26128",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26128"
          },
          {
            "name": "26108",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26108"
          },
          {
            "name": "24938",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/24938"
          },
          {
            "name": "2007-0023",
            "tags": [
              "vendor-advisory",
              "x_refsource_TRUSTIX",
              "x_transferred"
            ],
            "url": "http://www.trustix.org/errata/2007/0023/"
          },
          {
            "name": "26104",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26104"
          },
          {
            "name": "USN-484-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/usn-484-1"
          },
          {
            "name": "libcurl-gnutls-weak-security(35479)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35479"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.curl.haxx.se/docs/adv_20070710.html"
          },
          {
            "name": "DSA-1333",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2007/dsa-1333"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-07-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "libcurl 7.14.0 through 7.16.3, when built with GnuTLS support, does not check SSL/TLS certificate expiration or activation dates, which allows remote attackers to bypass certain access restrictions."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-28T12:57:01",
        "orgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc",
        "shortName": "canonical"
      },
      "references": [
        {
          "name": "26231",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26231"
        },
        {
          "name": "ADV-2007-2551",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/2551"
        },
        {
          "name": "26128",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26128"
        },
        {
          "name": "26108",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26108"
        },
        {
          "name": "24938",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/24938"
        },
        {
          "name": "2007-0023",
          "tags": [
            "vendor-advisory",
            "x_refsource_TRUSTIX"
          ],
          "url": "http://www.trustix.org/errata/2007/0023/"
        },
        {
          "name": "26104",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26104"
        },
        {
          "name": "USN-484-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/usn-484-1"
        },
        {
          "name": "libcurl-gnutls-weak-security(35479)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35479"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.curl.haxx.se/docs/adv_20070710.html"
        },
        {
          "name": "DSA-1333",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2007/dsa-1333"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@ubuntu.com",
          "ID": "CVE-2007-3564",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "libcurl 7.14.0 through 7.16.3, when built with GnuTLS support, does not check SSL/TLS certificate expiration or activation dates, which allows remote attackers to bypass certain access restrictions."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "26231",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26231"
            },
            {
              "name": "ADV-2007-2551",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/2551"
            },
            {
              "name": "26128",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26128"
            },
            {
              "name": "26108",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26108"
            },
            {
              "name": "24938",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/24938"
            },
            {
              "name": "2007-0023",
              "refsource": "TRUSTIX",
              "url": "http://www.trustix.org/errata/2007/0023/"
            },
            {
              "name": "26104",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26104"
            },
            {
              "name": "USN-484-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/usn-484-1"
            },
            {
              "name": "libcurl-gnutls-weak-security(35479)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35479"
            },
            {
              "name": "http://www.curl.haxx.se/docs/adv_20070710.html",
              "refsource": "MISC",
              "url": "http://www.curl.haxx.se/docs/adv_20070710.html"
            },
            {
              "name": "DSA-1333",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2007/dsa-1333"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc",
    "assignerShortName": "canonical",
    "cveId": "CVE-2007-3564",
    "datePublished": "2007-07-18T17:00:00",
    "dateReserved": "2007-07-05T00:00:00",
    "dateUpdated": "2024-08-07T14:21:36.293Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-2417 (GCVE-0-2009-2417)
Vulnerability from cvelistv5
Published
2009-08-14 15:00
Modified
2024-08-07 05:52
Severity ?
CWE
  • n/a
Summary
lib/ssluse.c in cURL and libcurl 7.4 through 7.19.5, when OpenSSL is used, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
References
http://curl.haxx.se/CVE-2009-2417/curl-7.15.1-CVE-2009-2417.patch x_refsource_CONFIRM
http://curl.haxx.se/CVE-2009-2417/curl-7.19.0-CVE-2009-2417.patch x_refsource_CONFIRM
http://curl.haxx.se/CVE-2009-2417/curl-7.19.5-CVE-2009-2417.patch x_refsource_CONFIRM
http://curl.haxx.se/CVE-2009-2417/curl-7.12.1-CVE-2009-2417.patch x_refsource_CONFIRM
http://www.securityfocus.com/archive/1/506055/100/0/threaded mailing-list, x_refsource_BUGTRAQ
http://secunia.com/advisories/37471 third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2009/2263 vdb-entry, x_refsource_VUPEN
http://www.ubuntu.com/usn/USN-1158-1 vendor-advisory, x_refsource_UBUNTU
http://www.vmware.com/security/advisories/VMSA-2009-0016.html x_refsource_CONFIRM
http://secunia.com/advisories/36238 third-party-advisory, x_refsource_SECUNIA
http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html vendor-advisory, x_refsource_APPLE
https://exchange.xforce.ibmcloud.com/vulnerabilities/52405 vdb-entry, x_refsource_XF
http://curl.haxx.se/CVE-2009-2417/curl-7.16.4-CVE-2009-2417.patch x_refsource_CONFIRM
http://wiki.rpath.com/Advisories:rPSA-2009-0124 x_refsource_CONFIRM
http://curl.haxx.se/CVE-2009-2417/curl-7.10.6-CVE-2009-2417.patch x_refsource_CONFIRM
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8542 vdb-entry, signature, x_refsource_OVAL
http://curl.haxx.se/CVE-2009-2417/curl-7.18.1-CVE-2009-2417.patch x_refsource_CONFIRM
http://www.securityfocus.com/archive/1/507985/100/0/threaded mailing-list, x_refsource_BUGTRAQ
http://support.apple.com/kb/HT4077 x_refsource_CONFIRM
http://shibboleth.internet2.edu/secadv/secadv_20090817.txt x_refsource_CONFIRM
http://secunia.com/advisories/36475 third-party-advisory, x_refsource_SECUNIA
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10114 vdb-entry, signature, x_refsource_OVAL
http://curl.haxx.se/docs/adv_20090812.txt x_refsource_CONFIRM
http://secunia.com/advisories/45047 third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/bid/36032 vdb-entry, x_refsource_BID
http://curl.haxx.se/CVE-2009-2417/curl-7.15.5-CVE-2009-2417.patch x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2009/3316 vdb-entry, x_refsource_VUPEN
http://curl.haxx.se/CVE-2009-2417/curl-7.11.0-CVE-2009-2417.patch x_refsource_CONFIRM
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T05:52:14.669Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.15.1-CVE-2009-2417.patch"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.19.0-CVE-2009-2417.patch"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.19.5-CVE-2009-2417.patch"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.12.1-CVE-2009-2417.patch"
          },
          {
            "name": "20090824 rPSA-2009-0124-1 curl",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/506055/100/0/threaded"
          },
          {
            "name": "37471",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/37471"
          },
          {
            "name": "ADV-2009-2263",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/2263"
          },
          {
            "name": "USN-1158-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1158-1"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
          },
          {
            "name": "36238",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/36238"
          },
          {
            "name": "APPLE-SA-2010-03-29-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html"
          },
          {
            "name": "curl-certificate-security-bypass(52405)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/52405"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.16.4-CVE-2009-2417.patch"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://wiki.rpath.com/Advisories:rPSA-2009-0124"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.10.6-CVE-2009-2417.patch"
          },
          {
            "name": "oval:org.mitre.oval:def:8542",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8542"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.18.1-CVE-2009-2417.patch"
          },
          {
            "name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.apple.com/kb/HT4077"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://shibboleth.internet2.edu/secadv/secadv_20090817.txt"
          },
          {
            "name": "36475",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/36475"
          },
          {
            "name": "oval:org.mitre.oval:def:10114",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10114"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://curl.haxx.se/docs/adv_20090812.txt"
          },
          {
            "name": "45047",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45047"
          },
          {
            "name": "36032",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/36032"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.15.5-CVE-2009-2417.patch"
          },
          {
            "name": "ADV-2009-3316",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/3316"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.11.0-CVE-2009-2417.patch"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-08-12T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "lib/ssluse.c in cURL and libcurl 7.4 through 7.19.5, when OpenSSL is used, does not properly handle a \u0027\\0\u0027 character in a domain name in the subject\u0027s Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-10T18:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.15.1-CVE-2009-2417.patch"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.19.0-CVE-2009-2417.patch"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.19.5-CVE-2009-2417.patch"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.12.1-CVE-2009-2417.patch"
        },
        {
          "name": "20090824 rPSA-2009-0124-1 curl",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/506055/100/0/threaded"
        },
        {
          "name": "37471",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/37471"
        },
        {
          "name": "ADV-2009-2263",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/2263"
        },
        {
          "name": "USN-1158-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1158-1"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
        },
        {
          "name": "36238",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/36238"
        },
        {
          "name": "APPLE-SA-2010-03-29-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html"
        },
        {
          "name": "curl-certificate-security-bypass(52405)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/52405"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.16.4-CVE-2009-2417.patch"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://wiki.rpath.com/Advisories:rPSA-2009-0124"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.10.6-CVE-2009-2417.patch"
        },
        {
          "name": "oval:org.mitre.oval:def:8542",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8542"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.18.1-CVE-2009-2417.patch"
        },
        {
          "name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.apple.com/kb/HT4077"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://shibboleth.internet2.edu/secadv/secadv_20090817.txt"
        },
        {
          "name": "36475",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/36475"
        },
        {
          "name": "oval:org.mitre.oval:def:10114",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10114"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://curl.haxx.se/docs/adv_20090812.txt"
        },
        {
          "name": "45047",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45047"
        },
        {
          "name": "36032",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/36032"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.15.5-CVE-2009-2417.patch"
        },
        {
          "name": "ADV-2009-3316",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/3316"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.11.0-CVE-2009-2417.patch"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2009-2417",
    "datePublished": "2009-08-14T15:00:00",
    "dateReserved": "2009-07-09T00:00:00",
    "dateUpdated": "2024-08-07T05:52:14.669Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}