Vulnerability Description
libcurl 7.14.0 through 7.16.3, when built with GnuTLS support, does not check SSL/TLS certificate expiration or activation dates, which allows remote attackers to bypass certain access restrictions.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Libcurl | Libcurl | 7.14 |
References
- http://secunia.com/advisories/26104PatchVendor Advisory
- http://secunia.com/advisories/26108PatchVendor Advisory
- http://secunia.com/advisories/26128
- http://secunia.com/advisories/26231
- http://www.curl.haxx.se/docs/adv_20070710.htmlPatchVendor Advisory
- http://www.debian.org/security/2007/dsa-1333
- http://www.securityfocus.com/bid/24938
- http://www.trustix.org/errata/2007/0023/
- http://www.ubuntu.com/usn/usn-484-1Patch
- http://www.vupen.com/english/advisories/2007/2551
- https://exchange.xforce.ibmcloud.com/vulnerabilities/35479
- http://secunia.com/advisories/26104PatchVendor Advisory
- http://secunia.com/advisories/26108PatchVendor Advisory
- http://secunia.com/advisories/26128
- http://secunia.com/advisories/26231
FAQ
What is CVE-2007-3564?
CVE-2007-3564 is a vulnerability with a CVSS score of 7.5 (HIGH). libcurl 7.14.0 through 7.16.3, when built with GnuTLS support, does not check SSL/TLS certificate expiration or activation dates, which allows remote attackers to bypass certain access restrictions.
How severe is CVE-2007-3564?
CVE-2007-3564 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-3564?
Check the references section above for vendor advisories and patch information. Affected products include: Libcurl Libcurl.