{"id":"CURL-CVE-2013-6422","summary":"cert name check ignore with GnuTLS","details":"(This issue is almost identical to the one named\n  [CVE-2013-4545](CVE-2013-4545.html), but this problem affects a different SSL\n  backend.)\n\n  libcurl is vulnerable to a case of missing out the checking of the\n  certificate `CN` or `SAN` name field when the digital signature verification\n  is turned off.\n\n  libcurl offers two separate and independent options for verifying a server's\n  TLS certificate. `CURLOPT_SSL_VERIFYPEER` and `CURLOPT_SSL_VERIFYHOST`. The\n  first one tells libcurl to verify the trust chain using a CA cert bundle,\n  while the second tells libcurl to make sure that the name fields in the\n  server certificate meets the criteria. Both options are enabled by default.\n\n  This flaw had the effect that when an application disabled\n  `CURLOPT_SSL_VERIFYPEER`, libcurl mistakenly also skipped the\n  `CURLOPT_SSL_VERIFYHOST` check. Applications can disable\n  `CURLOPT_SSL_VERIFYPEER` and still achieve security by doing the check on\n  its own using other means.\n\n  The curl command line tool is not affected by this problem as it either\n  enables both options or disables both at the same time.","aliases":["CVE-2013-6422"],"modified":"2024-06-07T13:53:51Z","published":"2013-12-17T08:00:00Z","database_specific":{"severity":"Medium","last_affected":"7.33.0","URL":"https://curl.se/docs/CVE-2013-6422.json","affects":"lib","package":"curl","www":"https://curl.se/docs/CVE-2013-6422.html","CWE":{"desc":"Improper Validation of Certificate with Host Mismatch","id":"CWE-297"}},"affected":[{"ranges":[{"type":"SEMVER","events":[{"introduced":"7.21.4"},{"fixed":"7.34.0"}]}],"versions":["7.33.0","7.32.0","7.31.0","7.30.0","7.29.0","7.28.1","7.28.0","7.27.0","7.26.0","7.25.0","7.24.0","7.23.1","7.23.0","7.22.0","7.21.7","7.21.6","7.21.5","7.21.4"],"database_specific":{"source":"https://curl.se/docs/CURL-CVE-2013-6422.json"}}],"schema_version":"1.7.3","credits":[{"name":"Marc Deslauriers","type":"FINDER"},{"name":"Daniel Stenberg","type":"REMEDIATION_DEVELOPER"}]}