CVE-2016-3739

MEDIUM
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

The (1) mbed_connect_step1 function in lib/vtls/mbedtls.c and (2) polarssl_connect_step1 function in lib/vtls/polarssl.c in cURL and libcurl before 7.49.0, when using SSLv3 or making a TLS connection to a URL that uses a numerical IP address, allow remote attackers to spoof servers via an arbitrary valid certificate.

References

http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html

http://www.securityfocus.com/bid/90726

http://www.securitytracker.com/id/1035907

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.495349

https://curl.haxx.se/changes.html#7_49_0

https://curl.haxx.se/CVE-2016-3739.patch

https://curl.haxx.se/docs/adv_20160518.html

https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149

https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722

https://security.gentoo.org/glsa/201701-47

Details

Source: MITRE

Published: 2016-05-20

Updated: 2018-10-17

Type: CWE-20

Risk Information

CVSS v2

Base Score: 2.6

Vector: AV:N/AC:H/Au:N/C:N/I:P/A:N

Impact Score: 2.9

Exploitability Score: 4.9

Severity: LOW

CVSS v3

Base Score: 5.3

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N

Impact Score: 3.6

Exploitability Score: 1.6

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:haxx:curl:7.21.0:*:*:*:*:*:*:*

cpe:2.3:a:haxx:curl:7.21.1:*:*:*:*:*:*:*

cpe:2.3:a:haxx:curl:7.21.2:*:*:*:*:*:*:*

cpe:2.3:a:haxx:curl:7.21.3:*:*:*:*:*:*:*

cpe:2.3:a:haxx:curl:7.21.4:*:*:*:*:*:*:*

cpe:2.3:a:haxx:curl:7.21.5:*:*:*:*:*:*:*

cpe:2.3:a:haxx:curl:7.21.6:*:*:*:*:*:*:*

cpe:2.3:a:haxx:curl:7.21.7:*:*:*:*:*:*:*

cpe:2.3:a:haxx:curl:7.22.0:*:*:*:*:*:*:*

cpe:2.3:a:haxx:curl:7.23.0:*:*:*:*:*:*:*

cpe:2.3:a:haxx:curl:7.23.1:*:*:*:*:*:*:*

cpe:2.3:a:haxx:curl:7.24.0:*:*:*:*:*:*:*

cpe:2.3:a:haxx:curl:7.25.0:*:*:*:*:*:*:*

cpe:2.3:a:haxx:curl:7.26.0:*:*:*:*:*:*:*

cpe:2.3:a:haxx:curl:7.27.0:*:*:*:*:*:*:*

cpe:2.3:a:haxx:curl:7.28.0:*:*:*:*:*:*:*

cpe:2.3:a:haxx:curl:7.28.1:*:*:*:*:*:*:*

cpe:2.3:a:haxx:curl:7.29.0:*:*:*:*:*:*:*

cpe:2.3:a:haxx:curl:7.30.0:*:*:*:*:*:*:*

cpe:2.3:a:haxx:curl:7.31.0:*:*:*:*:*:*:*

cpe:2.3:a:haxx:curl:7.32.0:*:*:*:*:*:*:*

cpe:2.3:a:haxx:curl:7.33.0:*:*:*:*:*:*:*

cpe:2.3:a:haxx:curl:7.34.0:*:*:*:*:*:*:*

cpe:2.3:a:haxx:curl:7.35.0:*:*:*:*:*:*:*

cpe:2.3:a:haxx:curl:7.36.0:*:*:*:*:*:*:*

cpe:2.3:a:haxx:curl:7.38.0:*:*:*:*:*:*:*

cpe:2.3:a:haxx:curl:7.39.0:*:*:*:*:*:*:*

cpe:2.3:a:haxx:curl:7.40.0:*:*:*:*:*:*:*

cpe:2.3:a:haxx:curl:7.41.0:*:*:*:*:*:*:*

cpe:2.3:a:haxx:curl:7.42.0:*:*:*:*:*:*:*

cpe:2.3:a:haxx:curl:7.42.1:*:*:*:*:*:*:*

cpe:2.3:a:haxx:curl:7.43.0:*:*:*:*:*:*:*

cpe:2.3:a:haxx:curl:7.44.0:*:*:*:*:*:*:*

cpe:2.3:a:haxx:curl:7.45.0:*:*:*:*:*:*:*

cpe:2.3:a:haxx:curl:7.46.0:*:*:*:*:*:*:*

cpe:2.3:a:haxx:curl:7.47.0:*:*:*:*:*:*:*

cpe:2.3:a:haxx:curl:7.48.0:*:*:*:*:*:*:*

Tenable Plugins

View all (7 total)

IDNameProductFamilySeverity
137468EulerOS 2.0 SP2 : curl (EulerOS-SA-2020-1626)NessusHuawei Local Security Checks
critical
99930Oracle Secure Global Desktop Multiple Vulnerabilities (April 2017 CPU) (SWEET32)NessusMisc.
critical
96644GLSA-201701-47 : cURL: Multiple vulnerabilitiesNessusGentoo Local Security Checks
critical
9762cURL/libcurl 7.x < 7.49.0 Information DisclosureNessus Network MonitorWeb Clients
low
94654HP System Management Homepage < 7.6 Multiple Vulnerabilities (HPSBMU03653) (httpoxy)NessusWeb Servers
high
802007cURL >= 7.21.0 and < 7.49.0 MitM SpoofingLog Correlation EngineWeb Clients
medium
91285Slackware 13.0 / 13.1 / 13.37 / 14.0 / 14.1 / current : curl (SSA:2016-141-01)NessusSlackware Local Security Checks
medium