Joined: 12 May 2004
|Posted: Fri Sep 25, 2009 7:26 pm Post subject: [ GLSA 200909-20 ] cURL: Certificate validation error
|Gentoo Linux Security Advisory
Title: cURL: Certificate validation error (GLSA 200909-20)
Date: September 25, 2009
An error in the X.509 certificate handling of cURL might enable remote
attackers to conduct man-in-the-middle attacks.
cURL is a command line tool for transferring files with URL syntax,
supporting numerous protocols.
Vulnerable: < 7.19.6
Unaffected: >= 7.19.6
Architectures: All supported architectures
Scott Cantor reported that cURL does not properly handle fields in
X.509 certificates that contain an ASCII NUL ( ) character.
Specifically, the processing of such fields is stopped at the first
occurence of a NUL character. This type of vulnerability was recently
discovered by Dan Kaminsky and Moxie Marlinspike.
A remote attacker might employ a specially crafted X.509 certificate
(that for instance contains a NUL character in the Common Name field)
to conduct man-in-the-middle attacks.
There is no known workaround at this time.
All cURL users should upgrade to the latest version:
|# emerge --sync
# emerge --ask --oneshot --verbose ">=net-misc/curl-7.19.6"
Last edited by GLSA on Sun Aug 19, 2012 4:28 am; edited 3 times in total