The darwinssl_connect_step1 function in lib/vtls/curl_darwinssl.c in libcurl 7.31.0 through 7.39.0, when using the DarwinSSL (aka SecureTransport) back-end for TLS, does not check if a cached TLS session validated the certificate when reusing the session, which allows man-in-the-middle attackers to spoof servers via a crafted certificate.
2015-01-15T15:59:07.670
2025-04-12T10:46:40.837
Deferred
CVSSv2: 5.8 (MEDIUM)
AV:N/AC:M/Au:N/C:P/I:P/A:N
8.6
4.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | apple | mac_os_x | ≤ 10.10.4 | Yes |
Application | haxx | libcurl | 7.31.0 | Yes |
Application | haxx | libcurl | 7.32.0 | Yes |
Application | haxx | libcurl | 7.33.0 | Yes |
Application | haxx | libcurl | 7.34.0 | Yes |
Application | haxx | libcurl | 7.35.0 | Yes |
Application | haxx | libcurl | 7.36.0 | Yes |
Application | haxx | libcurl | 7.37.0 | Yes |
Application | haxx | libcurl | 7.37.1 | Yes |
Application | haxx | libcurl | 7.38.0 | Yes |
Application | haxx | libcurl | 7.39 | Yes |