4

CVE-2013-6422

The GnuTLS backend in libcurl 7.21.4 through 7.33.0, when disabling digital signature verification (CURLOPT_SSL_VERIFYPEER), also disables the CURLOPT_SSL_VERIFYHOST check for CN or SAN host name fields, which makes it easier for remote attackers to spoof servers and conduct man-in-the-middle (MITM) attacks.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
DebianDebian Linux Version7.0
CanonicalUbuntu Linux Version12.04 Update- Editionlts
CanonicalUbuntu Linux Version12.10
CanonicalUbuntu Linux Version13.04
CanonicalUbuntu Linux Version13.10
HaxxLibcurl Version7.21.4
HaxxLibcurl Version7.21.5
HaxxLibcurl Version7.21.6
HaxxLibcurl Version7.21.7
HaxxLibcurl Version7.22.0
HaxxLibcurl Version7.23.0
HaxxLibcurl Version7.23.1
HaxxLibcurl Version7.24.0
HaxxLibcurl Version7.25.0
HaxxLibcurl Version7.26.0
HaxxLibcurl Version7.27.0
HaxxLibcurl Version7.28.0
HaxxLibcurl Version7.28.1
HaxxLibcurl Version7.29.0
HaxxLibcurl Version7.30.0
HaxxLibcurl Version7.31.0
HaxxLibcurl Version7.32.0
HaxxLibcurl Version7.33.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.34% 0.564
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 4 4.9 4.9
AV:N/AC:H/Au:N/C:P/I:P/A:N
CWE-20 Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.