Vulnerability Description
curl and libcurl 7.27.0 through 7.35.0, when using the SecureTransport/Darwinssl backend, as used in in Apple OS X 10.9.x before 10.9.2, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate when accessing a URL that uses a numerical IP address, which allows man-in-the-middle attackers to spoof servers via an arbitrary valid certificate.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apple | Mac Os X | <= 10.9.1 |
Related Weaknesses (CWE)
References
- http://curl.haxx.se/docs/adv_20140326C.html
- http://secunia.com/advisories/57836
- http://secunia.com/advisories/57966
- http://secunia.com/advisories/57968
- http://support.apple.com/kb/HT6150Vendor Advisory
- http://twitter.com/agl__/statuses/437029812046422016
- http://twitter.com/okoeroo/statuses/437272014043496449Exploit
- http://www.getchef.com/blog/2014/04/09/chef-server-11-0-12-release/
- http://www.getchef.com/blog/2014/04/09/enterprise-chef-1-4-9-release/
- http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/
- https://gist.github.com/rmoriz/fb2b0a6a0ce10550ab73Exploit
- http://curl.haxx.se/docs/adv_20140326C.html
- http://secunia.com/advisories/57836
- http://secunia.com/advisories/57966
- http://secunia.com/advisories/57968
FAQ
What is CVE-2014-1263?
CVE-2014-1263 is a vulnerability with a CVSS score of 4.3 (MEDIUM). curl and libcurl 7.27.0 through 7.35.0, when using the SecureTransport/Darwinssl backend, as used in in Apple OS X 10.9.x before 10.9.2, does not verify that the server hostname matches a domain name ...
How severe is CVE-2014-1263?
CVE-2014-1263 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-1263?
Check the references section above for vendor advisories and patch information. Affected products include: Apple Mac Os X.