5.8
CVSSv2

CVE-2014-8151

Published: 15/01/2015 Updated: 01/07/2017
CVSS v2 Base Score: 5.8 | Impact Score: 4.9 | Exploitability Score: 8.6
VMScore: 516
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N

Vulnerability Summary

The darwinssl_connect_step1 function in lib/vtls/curl_darwinssl.c in libcurl 7.31.0 up to and including 7.39.0, when using the DarwinSSL (aka SecureTransport) back-end for TLS, does not check if a cached TLS session validated the certificate when reusing the session, which allows man-in-the-middle malicious users to spoof servers via a crafted certificate.

Vulnerable Product Search on Vulmon Subscribe to Product

apple mac os x

haxx libcurl 7.31.0

haxx libcurl 7.32.0

haxx libcurl 7.38.0

haxx libcurl 7.39

haxx libcurl 7.37.0

haxx libcurl 7.37.1

haxx libcurl 7.33.0

haxx libcurl 7.34.0

haxx libcurl 7.35.0

haxx libcurl 7.36.0

Vendor Advisories

The darwinssl_connect_step1 function in lib/vtls/curl_darwinsslc in libcurl 7310 through 7390, when using the DarwinSSL (aka SecureTransport) back-end for TLS, does not check if a cached TLS session validated the certificate when reusing the session, which allows man-in-the-middle attackers to spoof servers via a crafted certificate ...