Bug 1037918 (CVE-2013-6422) - CVE-2013-6422 curl: TLS/SSL certificate name check disabled with peer verification when using GnuTLS
Summary: CVE-2013-6422 curl: TLS/SSL certificate name check disabled with peer verific...
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2013-6422
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks: 1037921
TreeView+ depends on / blocked
 
Reported: 2013-12-04 04:39 UTC by Murray McAllister
Modified: 2023-05-12 01:24 UTC (History)
3 users (show)

Fixed In Version: curl 7.34.0
Clone Of:
Environment:
Last Closed: 2013-12-12 13:36:56 UTC
Embargoed:


Attachments (Terms of Use)

Description Murray McAllister 2013-12-04 04:39:18 UTC
Curl upstream reported an issue (similar to CVE-2013-4545) related to the verification of the connection host name against the server name specified in a TLS/SSL server certificate. When libcurl was built using GnuTLS as TLS/SSL library, setting CURLOPT_SSL_VERIFYPEER option to 0 (i.e. disabling verification that the certificate is valid and was issued by a trusted certificate authority) also disabled server name checks regardless of the value of the CURLOPT_SSL_VERIFYHOST option. This caused libcurl to skip name checks while an application using the library could expect it to be performed.

Note: Only enabling VERIFYHOST while disabling VERIFYPEER is insecure unless the application performs its own peer verification equivalent to the verification performed by libcurl when VERIFYPEER is enabled.

The curl command line tool is not affected, as it disables both VERIFYPEER and VERIFYHOST when the -k / --insecure command line option is used.

Documentation for VERIFYPEER and VERIFYHOST options:
http://curl.haxx.se/libcurl/c/curl_easy_setopt.html#CURLOPTSSLVERIFYPEER
http://curl.haxx.se/libcurl/c/curl_easy_setopt.html#CURLOPTSSLVERIFYHOST

Acknowledgements:

Red Hat would like to thank the cURL project for reporting this issue. Upstream acknowledges Marc Deslauriers as the original reporter.

Comment 2 Tomas Hoger 2013-12-12 13:36:56 UTC
This does not affect curl packages shipped in Red Hat Enterprise Linux and Fedora, as they do not use GnuTLS as TLS/SSL backend.

The curl packages in Red Hat Enterprise Linux 5 and earlier, as well as mingw*-curl packages in Fedora and EPEL, use OpenSSL backend.  The curl packages in Red Hat Enterprise Linux 6 and current Fedora versions use NSS backend.  Bug 1029159 comment 0 provides an overview of how these packages are affected or not affected by this problem.

Statement:

Not vulnerable. This issue did not affect the versions of curl as shipped with Red Hat Enterprise Linux 5 and 6.

Comment 3 Tomas Hoger 2013-12-17 15:06:09 UTC
Public now via upstream advisory, fix released as part of upstream version 7.34.0.

External References:

http://curl.haxx.se/docs/adv_20131217.html


Note You need to log in before you can comment on or make changes to this bug.