curl / Docs / Security Problems / not verifying certs for TLS to IP address / Winssl

not verifying certs for TLS to IP address / Winssl

Project curl Security Advisory, March 26th 2014 Permalink

VULNERABILITY

When asked to do a TLS connection (HTTPS, FTPS, IMAPS, etc) to a URL specified with an IP address instead of a name, libcurl would wrongly not verify the server's name in the certificate. The signature (whether it was signed by a trusted CA) and validity (whether the date was within the certificate's lifetime and it was not revoked) verifications were still performed.

This is a problem in libcurl built to use the SChannel/Winssl TLS backend. SChannel/Winssl is the native library provided by Microsoft Windows.

Only users on Windows can be affected by this. And only if libcurl was built to use the native TLS backend library.

The Common Vulnerabilities and Exposures (CVE) project has assigned the name CVE-2014-2522 to this issue.

CWE-297: Improper Validation of Certificate with Host Mismatch

AFFECTED VERSIONS

This flaw has existed ever since libcurl started to support the SChannel/Winssl backend.

libcurl is used by many applications, but not always advertised as such!

THE SOLUTION

libcurl 7.36.0 makes sure that all TLS using requests verify the host name even if specified as an IP address in the URL.

A patch for this problem is available

The fix was committed to the public source code repository because the full security impact wasn't properly realized until after the fact.

RECOMMENDATIONS

We suggest you take one of the following actions immediately, in order of preference:

A - Upgrade to curl and libcurl 7.36.0

B - Apply the patch and rebuild libcurl

C - Rebuild libcurl to use another TLS backend

TIME LINE

It was discovered by the curl project during late February 2014.

libcurl 7.36.0 was released on March 26th 2014, coordinated with the publication of this advisory.

CREDITS

Marc Hoersken helped coordinate the bug fix.

Thanks a lot!