cvelist/2024/2xxx/CVE-2024-2466.json

129 lines
4.7 KiB
JSON
Raw Normal View History

2024-04-01 20:45:57 +00:00
{
2024-04-02 15:20:09 +00:00
"data_version": "4.0",
2024-04-01 20:45:57 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2024-2466",
2024-04-02 15:20:09 +00:00
"ASSIGNER": "cve@curl.se",
"STATE": "PUBLIC"
2024-04-01 20:45:57 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2024-04-02 15:20:09 +00:00
"value": "libcurl did not check the server certificate of TLS connections done to a host specified as an IP address, when built to use mbedTLS. libcurl would wrongly avoid using the set hostname function when the specified hostname was given as an IP address, therefore completely skipping the certificate check. This affects all uses of TLS protocols (HTTPS, FTPS, IMAPS, POPS3, SMTPS, etc)."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-297 Improper Validation of Certificate with Host Mismatch "
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "curl",
"product": {
"product_data": [
{
"product_name": "curl",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "8.6.0",
"version_value": "8.6.0"
},
{
"version_affected": "<=",
"version_name": "8.5.0",
"version_value": "8.5.0"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://curl.se/docs/CVE-2024-2466.json",
"refsource": "MISC",
"name": "https://curl.se/docs/CVE-2024-2466.json"
},
{
"url": "https://curl.se/docs/CVE-2024-2466.html",
"refsource": "MISC",
"name": "https://curl.se/docs/CVE-2024-2466.html"
},
{
"url": "https://hackerone.com/reports/2416725",
"refsource": "MISC",
"name": "https://hackerone.com/reports/2416725"
2024-05-01 18:01:19 +00:00
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/03/27/4",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2024/03/27/4"
2024-05-03 14:00:36 +00:00
},
{
"url": "https://security.netapp.com/advisory/ntap-20240503-0010/",
"refsource": "MISC",
"name": "https://security.netapp.com/advisory/ntap-20240503-0010/"
2024-07-29 23:00:38 +00:00
},
{
"url": "https://support.apple.com/kb/HT214119",
"refsource": "MISC",
"name": "https://support.apple.com/kb/HT214119"
},
{
"url": "https://support.apple.com/kb/HT214118",
"refsource": "MISC",
"name": "https://support.apple.com/kb/HT214118"
},
{
"url": "https://support.apple.com/kb/HT214120",
"refsource": "MISC",
"name": "https://support.apple.com/kb/HT214120"
2024-07-30 02:00:37 +00:00
},
{
"url": "http://seclists.org/fulldisclosure/2024/Jul/20",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2024/Jul/20"
2024-07-30 02:01:10 +00:00
},
{
"url": "http://seclists.org/fulldisclosure/2024/Jul/18",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2024/Jul/18"
},
{
"url": "http://seclists.org/fulldisclosure/2024/Jul/19",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2024/Jul/19"
2024-04-01 20:45:57 +00:00
}
]
2024-04-02 15:20:09 +00:00
},
"credits": [
{
"lang": "en",
"value": "Frank Yueh"
},
{
"lang": "en",
"value": "Stefan Eissing"
}
]
2024-04-01 20:45:57 +00:00
}