#VU32181 Improper Certificate Validation in cURL - CVE-2016-9952 

 

#VU32181 Improper Certificate Validation in cURL - CVE-2016-9952

Published: March 12, 2018 / Updated: July 28, 2020


Vulnerability identifier: #VU32181
Vulnerability risk: High
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: CVE-2016-9952
CWE-ID: CWE-295
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
cURL
Software vendor:
curl.haxx.se

Description

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

The verify_certificate function in lib/vtls/schannel.c in libcurl 7.30.0 through 7.51.0, when built for Windows CE using the schannel TLS backend, makes it easier for remote attackers to conduct man-in-the-middle attacks via a crafted wildcard SAN in a server certificate, as demonstrated by "*.com."


Remediation

Install update from vendor's website.

External links