CVE-2009-2417
Publication date 14 August 2009
Last updated 24 July 2024
Ubuntu priority
lib/ssluse.c in cURL and libcurl 7.4 through 7.19.5, when OpenSSL is used, does not properly handle a ‘\0’ character in a domain name in the subject’s Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
From the Ubuntu Security Team
sbeattie> hardy’s patch for this issue was added to the end of the quilt series; unfortunately, the build system is quirky and pushes up patches by a name, thus the patch for this was not getting applied at build time. Fixed in usn-1158-1.
Status
Package | Ubuntu Release | Status |
---|---|---|
curl | 9.04 jaunty |
Fixed 7.18.2-8ubuntu4.1
|
8.10 intrepid |
Fixed 7.18.2-1ubuntu4.4
|
|
8.04 LTS hardy |
Fixed 7.18.0-1ubuntu2.3
|
|
6.06 LTS dapper |
Fixed 7.15.1-1ubuntu3.2
|
References
Related Ubuntu Security Notices (USN)
- USN-1158-1
- curl vulnerabilities
- 24 June 2011
- USN-818-1
- curl vulnerability
- 17 August 2009