6.5
CVSSv3

CVE-2017-2629

Published: 27/07/2018 Updated: 09/10/2019
CVSS v2 Base Score: 4 | Impact Score: 2.9 | Exploitability Score: 8
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
VMScore: 356
Vector: AV:N/AC:L/Au:S/C:N/I:P/A:N

Vulnerability Summary

curl prior to 7.53.0 has an incorrect TLS Certificate Status Request extension feature that asks for a fresh proof of the server's certificate's validity in the code that checks for a test success or failure. It ends up always thinking there's valid proof, even when there is none or if the server doesn't support the TLS extension in question. This could lead to users not detecting when a server's certificate goes invalid or otherwise be mislead that the server is in a better shape than it is in reality. This flaw also exists in the command line tool (--cert-status).

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

haxx curl

Vendor Advisories

curl before 7530 has an incorrect TLS Certificate Status Request extension feature that asks for a fresh proof of the server's certificate's validity in the code that checks for a test success or failure It ends up always thinking there's valid proof, even when there is none or if the server doesn't support the TLS extension in question This co ...
A coding error has been found in curl >= 7520 and < 7530, causing the TLS Certificate Status Request extension check to always return true curl and libcurl support "OCSP stapling", also known as the TLS Certificate Status Request extension (using the CURLOPT_SSL_VERIFYSTATUS option) When telling curl to use this feature, it uses that TL ...
Log Correlation Engine (LCE) 500 is impacted by multiple vulnerabilities reported in a third-party library and an encryption algorithm LCE was errantly using 3DES on TCP port 1243 The following vulnerabilities have been resolved with the updated libraries cURL / libcurl lib/urlc allocate_conn() Function OCSP Stapling Validation Failure MitM ...