curl vulnerability

Related Vulnerabilities: CVE-2013-6422  

Fraudulent security certificates could allow sensitive information to be exposed when accessing the Internet.

Marc Deslauriers discovered that libcurl incorrectly verified CN and SAN name fields when digital signature verification was disabled in the GnuTLS backend. When libcurl is being used in this uncommon way by specific applications, an attacker could exploit this to perform a man in the middle attack to view sensitive information or alter encrypted communications.

18 December 2013

curl vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 13.10
  • Ubuntu 13.04
  • Ubuntu 12.10
  • Ubuntu 12.04 LTS

Summary

Fraudulent security certificates could allow sensitive information to be exposed when accessing the Internet.

Software Description

  • curl - HTTP, HTTPS, and FTP client and client libraries

Details

Marc Deslauriers discovered that libcurl incorrectly verified CN and SAN name fields when digital signature verification was disabled in the GnuTLS backend. When libcurl is being used in this uncommon way by specific applications, an attacker could exploit this to perform a man in the middle attack to view sensitive information or alter encrypted communications.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 13.10
libcurl3-gnutls - 7.32.0-1ubuntu1.2
Ubuntu 13.04
libcurl3-gnutls - 7.29.0-1ubuntu3.4
Ubuntu 12.10
libcurl3-gnutls - 7.27.0-1ubuntu1.7
Ubuntu 12.04 LTS
libcurl3-gnutls - 7.22.0-3ubuntu4.6

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References