Bugzilla – Bug 982778
VUL-0: CVE-2016-3739: curl: TLS certificate name check bypass with mbedTLS and PolarSSL
Last modified: 2019-05-13 14:44:38 UTC
rh#1335430 The (1) mbed_connect_step1 function in lib/vtls/mbedtls.c and (2) polarssl_connect_step1 function in lib/vtls/polarssl.c in cURL and libcurl before 7.49.0, when using SSLv3 or making a TLS connection to a URL that uses a numerical IP address, allow remote attackers to spoof servers via an arbitrary valid certificate. References: https://bugzilla.redhat.com/show_bug.cgi?id=1335430 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-3739 http://seclists.org/oss-sec/2016/q2/362 http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-3739.html http://www.cvedetails.com/cve/CVE-2016-3739/ https://curl.haxx.se/CVE-2016-3739.patch https://curl.haxx.se/docs/adv_20160518.html https://curl.haxx.se/changes.html#7_49_0 http://www.securitytracker.com/id/1035907
This issue only affects curl when polarssl or embedtls is in use. We use openssl everywhere, so SUSE is not affected by this problem.