The darwinssl_connect_step1 function in lib/vtls/curl_darwinssl.c in libcurl 7.31.0 up to and including 7.39.0, when using the DarwinSSL (aka SecureTransport) back-end for TLS, does not check if a cached TLS session validated the certificate when reusing the session, which allows man-in-the-middle malicious users to spoof servers via a crafted certificate.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
apple mac os x |
||
haxx libcurl 7.31.0 |
||
haxx libcurl 7.32.0 |
||
haxx libcurl 7.38.0 |
||
haxx libcurl 7.39 |
||
haxx libcurl 7.37.0 |
||
haxx libcurl 7.37.1 |
||
haxx libcurl 7.33.0 |
||
haxx libcurl 7.34.0 |
||
haxx libcurl 7.35.0 |
||
haxx libcurl 7.36.0 |