Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2016-3739

Published: 20 May 2016

The (1) mbed_connect_step1 function in lib/vtls/mbedtls.c and (2) polarssl_connect_step1 function in lib/vtls/polarssl.c in cURL and libcurl before 7.49.0, when using SSLv3 or making a TLS connection to a URL that uses a numerical IP address, allow remote attackers to spoof servers via an arbitrary valid certificate.

Notes

AuthorNote
sbeattie
curl in ubuntu is built with gnutls

Priority

Medium

CVSS 3 base score: 5.3

Status

Package Release Status
curl
Launchpad, Ubuntu, Debian
upstream
Released (7.49.0)
precise Not vulnerable
(gnutls tls backend)
trusty Not vulnerable
(gnutls tls backend)
wily Not vulnerable
(gnutls tls backend)
xenial Not vulnerable
(gnutls tls backend)
Patches:
upstream: https://curl.haxx.se/CVE-2016-3739.patch