CVE-2014-8151

Priority
Medium
Description
The darwinssl_connect_step1 function in lib/vtls/curl_darwinssl.c in
libcurl 7.31.0 through 7.39.0, when using the DarwinSSL (aka
SecureTransport) back-end for TLS, does not check if a cached TLS session
validated the certificate when reusing the session, which allows
man-in-the-middle attackers to spoof servers via a crafted certificate.
References
Notes
 mdeslaur> specific to DarwinSSL backend
Package
Source: curl (LP Ubuntu Debian)
Upstream:released (7.38.0-4)
Ubuntu 14.04 LTS (Trusty Tahr):not-affected
More Information

Updated: 2017-12-14 20:03:40 UTC (commit 13907)