Security bypass in cURL - CVE-2017-2629

 

Security bypass in cURL - CVE-2017-2629

Published: February 22, 2017 / Updated: February 22, 2017


Vulnerability identifier: #VU5890
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2017-2629
CWE-ID: CWE-295
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: curl.haxx.se
Affected software:
cURL

Detailed vulnerability description

The vulnerability allows a remote attacker to bypass certain security restrictions.

The vulnerability exists due to an error within TLS Certificate Status Request extension implementation (a.k.a OCSP stapling) in cURL. The problem is caused by coding error, when the affected function returns positive result even when there is none or if the server doesn't support the TLS extension in question. A remote attacker can bypass CURLOPT_SSL_VERIFYSTATUS option and make the affected system treat all requests as valid.

Successful exploitation of the vulnerability may allow an attacker to bypass implemented security controls and perform a MitM or phishing attack.


How to mitigate CVE-2017-2629

Update to version 7.53.0

Sources