curl vulnerability

Related Vulnerabilities: CVE-2013-4545  

Fraudulent security certificates could allow sensitive information to be exposed when accessing the Internet.

Scott Cantor discovered that libcurl incorrectly verified CN and SAN name fields when digital signature verification was disabled. When libcurl is being used in this uncommon way by specific applications, an attacker could exploit this to perform a man in the middle attack to view sensitive information or alter encrypted communications.

5 December 2013

curl vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 13.10
  • Ubuntu 13.04
  • Ubuntu 12.10
  • Ubuntu 12.04 LTS
  • Ubuntu 10.04 LTS

Summary

Fraudulent security certificates could allow sensitive information to be exposed when accessing the Internet.

Software Description

  • curl - HTTP, HTTPS, and FTP client and client libraries

Details

Scott Cantor discovered that libcurl incorrectly verified CN and SAN name fields when digital signature verification was disabled. When libcurl is being used in this uncommon way by specific applications, an attacker could exploit this to perform a man in the middle attack to view sensitive information or alter encrypted communications.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 13.10
libcurl3 - 7.32.0-1ubuntu1.1
Ubuntu 13.04
libcurl3 - 7.29.0-1ubuntu3.3
Ubuntu 12.10
libcurl3 - 7.27.0-1ubuntu1.5
Ubuntu 12.04 LTS
libcurl3 - 7.22.0-3ubuntu4.4
Ubuntu 10.04 LTS
libcurl3 - 7.19.7-1ubuntu1.4

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References