FKIE_CVE-2013-4545

Vulnerability from fkie_nvd - Published: 2013-11-23 11:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
cURL and libcurl 7.18.0 through 7.32.0, when built with OpenSSL, disables the certificate CN and SAN name field verification (CURLOPT_SSL_VERIFYHOST) when the digital signature verification (CURLOPT_SSL_VERIFYPEER) is disabled, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
References
secalert@redhat.comhttp://curl.haxx.se/docs/adv_20131115.htmlVendor Advisory
secalert@redhat.comhttp://lists.opensuse.org/opensuse-updates/2013-12/msg00047.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-updates/2013-12/msg00053.html
secalert@redhat.comhttp://www.debian.org/security/2013/dsa-2798
secalert@redhat.comhttp://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
secalert@redhat.comhttp://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
secalert@redhat.comhttp://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-2048-1
secalert@redhat.comhttps://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04463322
af854a3a-2127-422b-91ae-364da2661108http://curl.haxx.se/docs/adv_20131115.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2013-12/msg00047.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2013-12/msg00053.html
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2013/dsa-2798
af854a3a-2127-422b-91ae-364da2661108http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
af854a3a-2127-422b-91ae-364da2661108http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
af854a3a-2127-422b-91ae-364da2661108http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2048-1
af854a3a-2127-422b-91ae-364da2661108https://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04463322
Impacted products
Vendor Product Version
haxx curl 7.18.0
haxx curl 7.18.1
haxx curl 7.18.2
haxx curl 7.19.0
haxx curl 7.19.1
haxx curl 7.19.2
haxx curl 7.19.3
haxx curl 7.19.4
haxx curl 7.19.5
haxx curl 7.19.6
haxx curl 7.19.7
haxx curl 7.20.0
haxx curl 7.20.1
haxx curl 7.21.0
haxx curl 7.21.1
haxx curl 7.21.2
haxx curl 7.21.3
haxx curl 7.21.4
haxx curl 7.21.5
haxx curl 7.21.6
haxx curl 7.21.7
haxx curl 7.22.0
haxx curl 7.23.0
haxx curl 7.23.1
haxx curl 7.24.0
haxx curl 7.25.0
haxx curl 7.26.0
haxx curl 7.27.0
haxx curl 7.28.0
haxx curl 7.28.1
haxx curl 7.29.0
haxx curl 7.30.0
haxx curl 7.31.0
haxx curl 7.32.0
haxx libcurl 7.18.0
haxx libcurl 7.18.1
haxx libcurl 7.18.2
haxx libcurl 7.19.0
haxx libcurl 7.19.1
haxx libcurl 7.19.2
haxx libcurl 7.19.3
haxx libcurl 7.19.4
haxx libcurl 7.19.5
haxx libcurl 7.19.6
haxx libcurl 7.19.7
haxx libcurl 7.20.0
haxx libcurl 7.20.1
haxx libcurl 7.21.0
haxx libcurl 7.21.1
haxx libcurl 7.21.2
haxx libcurl 7.21.3
haxx libcurl 7.21.4
haxx libcurl 7.21.5
haxx libcurl 7.21.6
haxx libcurl 7.21.7
haxx libcurl 7.22.0
haxx libcurl 7.23.0
haxx libcurl 7.23.1
haxx libcurl 7.24.0
haxx libcurl 7.25.0
haxx libcurl 7.26.0
haxx libcurl 7.27.0
haxx libcurl 7.28.0
haxx libcurl 7.28.1
haxx libcurl 7.29.0
haxx libcurl 7.30.0
haxx libcurl 7.31.0
haxx libcurl 7.32.0

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:haxx:curl:7.18.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7494C01F-E9EC-406E-879A-B2045865E282",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:haxx:curl:7.18.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DD9F894-4576-4ED1-9F55-4C27ECE7E058",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:haxx:curl:7.18.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "49AFACAC-BBAF-469B-BF05-0478E987120F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:haxx:curl:7.19.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A136E86-0697-4915-BC49-F570C776EDE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:haxx:curl:7.19.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECB241AF-A01D-4FD6-B98A-F4C20F844C2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:haxx:curl:7.19.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5B61901-F7DF-4805-8EB7-CA1701CA81CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:haxx:curl:7.19.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB0CDEC9-224A-4668-B2E4-2145653E3F2D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:haxx:curl:7.19.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E92BE9CB-F001-47A0-94E0-48FC01A63FE5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:haxx:curl:7.19.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "324E2A20-2F66-4E03-9A7F-A09E631E9033",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:haxx:curl:7.19.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8987B53-BD80-40B9-8429-21AD97208040",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:haxx:curl:7.19.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "490D1BDC-33B9-43BA-B6DA-42DEE577082A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:haxx:curl:7.20.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B465BE7E-0B4D-4BC4-894B-3F51A201CE91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:haxx:curl:7.20.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CAA17087-3021-4961-B53C-CDCC872A31A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:haxx:curl:7.21.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5CA3936-4602-40E6-B75C-58D3F24268E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:haxx:curl:7.21.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D87C110C-21DD-438A-90EF-BE516CF59F3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:haxx:curl:7.21.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD2D9E0E-2EED-4FB5-859C-05226FC48D7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:haxx:curl:7.21.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA01E21-71CE-4B07-B5A6-D0D7AC493A5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:haxx:curl:7.21.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "51239254-31CE-4BF7-8669-1525BA391362",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:haxx:curl:7.21.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E2BE20D-232D-4C86-81B0-C82CCC1CAA62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:haxx:curl:7.21.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D652FD7C-1521-4391-AAE1-0A4D6F4CE8F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:haxx:curl:7.21.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB861143-F809-45CF-95BE-E64F4BA1A0DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:haxx:curl:7.22.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3480F4A-0AE0-4428-9EDA-5A6B994909A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:haxx:curl:7.23.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "936BF59E-33A8-46BA-9FBD-8763812E2F10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:haxx:curl:7.23.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "33168C81-6DAE-40D6-9693-68390CD71DA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:haxx:curl:7.24.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "424F9604-AA9A-4D45-A521-0BDEDB723659",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:haxx:curl:7.25.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC6EBCEB-E52C-4FF5-B15A-6960F58090EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:haxx:curl:7.26.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D204E994-4591-403C-8EF3-D3B7BF4AA1A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:haxx:curl:7.27.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBF5418D-1162-4B1E-BC3D-06A3E084BEFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:haxx:curl:7.28.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CA65F31-3D54-4F66-A0A3-2BD993FF38F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:haxx:curl:7.28.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "41ACC9FE-62FF-424B-B4B8-B033FEAF7686",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:haxx:curl:7.29.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8BC39E9-5945-4DC8-ACA8-1C9918D9F279",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:haxx:curl:7.30.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9658447-FBB0-4DEA-8FEE-BD4D3D1BF7FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:haxx:curl:7.31.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5ECABFCB-0D02-4B5B-BB35-C6B3C0896348",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:haxx:curl:7.32.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A5176F0-E62F-46FF-B536-DC0680696773",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEA3D88B-41B9-4D79-B47D-B3D6058C0C27",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:haxx:libcurl:7.18.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2C80901-D48E-4C2A-9BED-A40007A11C97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "331A51E4-AA73-486F-9618-5A83965F2436",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:haxx:libcurl:7.19.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB32DF2C-9208-4853-ADEB-B00D764D7467",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:haxx:libcurl:7.19.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E05636DC-7E38-4605-AAB8-81C0AE37520A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:haxx:libcurl:7.19.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "624DF2F1-53FD-48D3-B93D-44E99C9C0C5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2171C7C-311A-4405-B95F-3A54966FA844",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:haxx:libcurl:7.19.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DE20A41-8B53-46FC-9002-69CC7495171F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:haxx:libcurl:7.19.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "87ED9DA0-E880-4CBB-B1AC-5AEE8A004718",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:haxx:libcurl:7.19.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "5293C7F0-BF9F-4768-889A-876CE78903CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:haxx:libcurl:7.19.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3EB41B3-65F3-4B0E-8CCC-325B14AF605B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "857B244C-2AFB-40C7-A893-7C6DE9871BCE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:haxx:libcurl:7.20.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B732CE55-820A-40E0-A885-71BBB6CF8C15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:haxx:libcurl:7.21.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0455A5F2-1515-4CD8-BA2F-74D28E91A661",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:haxx:libcurl:7.21.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "29034B3A-BE9D-4D68-8C56-4465C03C3693",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6249538E-FBCB-4130-91FB-DA78D7BA45DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:haxx:libcurl:7.21.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E11B8A5-50A2-468F-BFB3-86DD9D28AC73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:haxx:libcurl:7.21.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EAE25A0-3828-46F1-AB30-88732CBC9F38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:haxx:libcurl:7.21.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "1533A85C-2160-445D-8787-E624AEDC5A0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:haxx:libcurl:7.21.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D87B9393-7EA4-43DA-900C-7E840AE2D4C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:haxx:libcurl:7.21.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D1249E9-304F-4952-8DAB-8B79CE5E7D54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "83FAF953-6A65-4FAB-BDB5-03B468CD1C9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "29F8FF1F-A639-4161-9366-62528AAF4C07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:haxx:libcurl:7.23.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "812AB429-379A-4EDE-9664-5BC2989053F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:haxx:libcurl:7.24.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "13DD791F-C4BD-4456-955A-92E84082AA09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:haxx:libcurl:7.25.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A17E442-45AA-4780-98B4-9BF764DCC1C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6AF544C-5F16-4434-B9FB-93B1B7318950",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBFD9ED9-2412-44AE-9C55-0ED03A121B23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "67CCE31B-ABDA-4F32-BAF1-B1AD0664B3E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E66A332-ECD1-4452-B444-FB629022FDF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:haxx:libcurl:7.29.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDD3D599-35E9-4590-B5E0-3AF04D344695",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:haxx:libcurl:7.30.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3B6BFFB-7967-482C-9B49-4BD25C815299",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1791BF6D-2C96-4A6E-90D4-2906A73601F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "260DD751-4145-4B75-B892-5FC932C6A305",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "cURL and libcurl 7.18.0 through 7.32.0, when built with OpenSSL, disables the certificate CN and SAN name field verification (CURLOPT_SSL_VERIFYHOST) when the digital signature verification (CURLOPT_SSL_VERIFYPEER) is disabled, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate."
    },
    {
      "lang": "es",
      "value": "cURL y libcurl 7.18.0 hasta la versi\u00f3n 7.32.0, cuando es compilado con OpenSSL, desactiva la verificaci\u00f3n del nombre de campos del certificado CN y SAN (CURLOPT_SSL_VERIFYHOST) cuando la verificaci\u00f3n de firma digital (CURLOPT_SSL_VERIFYPEER) est\u00e1 desactivada, lo que permite a atacantes man-in-the-middle falsificar servidores SSL a trav\u00e9s de un certificado v\u00e1lido arbitrario."
    }
  ],
  "id": "CVE-2013-4545",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-11-23T11:55:04.740",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://curl.haxx.se/docs/adv_20131115.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00047.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00053.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2013/dsa-2798"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ubuntu.com/usn/USN-2048-1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04463322"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://curl.haxx.se/docs/adv_20131115.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00047.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00053.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2013/dsa-2798"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-2048-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04463322"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-310"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…