CVE-2016-3739

The (1) mbed_connect_step1 function in lib/vtls/mbedtls.c and (2) polarssl_connect_step1 function in lib/vtls/polarssl.c in cURL and libcurl before 7.49.0, when using SSLv3 or making a TLS connection to a URL that uses a numerical IP address, allow remote attackers to spoof servers via an arbitrary valid certificate.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:haxx:curl:7.21.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.21.1:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.21.2:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.21.3:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.21.4:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.21.5:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.21.6:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.21.7:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.22.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.23.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.23.1:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.24.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.25.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.26.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.27.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.28.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.28.1:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.29.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.30.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.31.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.32.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.33.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.34.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.35.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.36.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.38.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.39.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.40.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.41.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.42.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.42.1:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.43.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.44.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.45.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.46.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.47.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.48.0:*:*:*:*:*:*:*

History

21 Nov 2024, 02:50

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2024/03/27/4 - () http://www.openwall.com/lists/oss-security/2024/03/27/4 -
References () http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html - () http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -
References () http://www.securityfocus.com/bid/90726 - () http://www.securityfocus.com/bid/90726 -
References () http://www.securitytracker.com/id/1035907 - () http://www.securitytracker.com/id/1035907 -
References () http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.495349 - () http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.495349 -
References () https://curl.haxx.se/CVE-2016-3739.patch - Vendor Advisory () https://curl.haxx.se/CVE-2016-3739.patch - Vendor Advisory
References () https://curl.haxx.se/changes.html#7_49_0 - () https://curl.haxx.se/changes.html#7_49_0 -
References () https://curl.haxx.se/docs/adv_20160518.html - Vendor Advisory () https://curl.haxx.se/docs/adv_20160518.html - Vendor Advisory
References () https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149 - () https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149 -
References () https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 - () https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -
References () https://security.gentoo.org/glsa/201701-47 - () https://security.gentoo.org/glsa/201701-47 -

01 May 2024, 17:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2024/03/27/4 -

Information

Published : 2016-05-20 14:59

Updated : 2025-04-12 10:46


NVD link : CVE-2016-3739

Mitre link : CVE-2016-3739

CVE.ORG link : CVE-2016-3739


JSON object : View

Products Affected

haxx

  • curl
CWE
CWE-20

Improper Input Validation