CVE Vulnerabilities

CVE-2017-2629

Improper Certificate Validation

Published: Jul 27, 2018 | Modified: Oct 09, 2019
CVSS 3.x
6.5
MEDIUM
Source:
NVD
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
CVSS 2.x
4 MEDIUM
AV:N/AC:L/Au:S/C:N/I:P/A:N
RedHat/V2
RedHat/V3
4.3 MODERATE
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
Ubuntu
MEDIUM

curl before 7.53.0 has an incorrect TLS Certificate Status Request extension feature that asks for a fresh proof of the servers certificates validity in the code that checks for a test success or failure. It ends up always thinking theres valid proof, even when there is none or if the server doesnt support the TLS extension in question. This could lead to users not detecting when a servers certificate goes invalid or otherwise be mislead that the server is in a better shape than it is in reality. This flaw also exists in the command line tool (–cert-status).

Weakness

The product does not validate, or incorrectly validates, a certificate.

Affected Software

Name Vendor Start Version End Version
Curl Haxx * 7.53.0 (excluding)
Curl Ubuntu upstream *

Potential Mitigations

References