4

CVE-2013-6422

The GnuTLS backend in libcurl 7.21.4 through 7.33.0, when disabling digital signature verification (CURLOPT_SSL_VERIFYPEER), also disables the CURLOPT_SSL_VERIFYHOST check for CN or SAN host name fields, which makes it easier for remote attackers to spoof servers and conduct man-in-the-middle (MITM) attacks.

Data is provided by the National Vulnerability Database (NVD)
DebianDebian Linux Version7.0
CanonicalUbuntu Linux Version12.04 Update- Editionlts
CanonicalUbuntu Linux Version12.10
CanonicalUbuntu Linux Version13.04
CanonicalUbuntu Linux Version13.10
HaxxLibcurl Version7.21.4
HaxxLibcurl Version7.21.5
HaxxLibcurl Version7.21.6
HaxxLibcurl Version7.21.7
HaxxLibcurl Version7.22.0
HaxxLibcurl Version7.23.0
HaxxLibcurl Version7.23.1
HaxxLibcurl Version7.24.0
HaxxLibcurl Version7.25.0
HaxxLibcurl Version7.26.0
HaxxLibcurl Version7.27.0
HaxxLibcurl Version7.28.0
HaxxLibcurl Version7.28.1
HaxxLibcurl Version7.29.0
HaxxLibcurl Version7.30.0
HaxxLibcurl Version7.31.0
HaxxLibcurl Version7.32.0
HaxxLibcurl Version7.33.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.34% 0.564
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 4 4.9 4.9
AV:N/AC:H/Au:N/C:P/I:P/A:N
CWE-20 Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.