CVE-2016-3739

Published on: 05/20/2016 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:03 PM UTC

CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N

Certain versions of Curl from Haxx contain the following vulnerability:

The (1) mbed_connect_step1 function in lib/vtls/mbedtls.c and (2) polarssl_connect_step1 function in lib/vtls/polarssl.c in cURL and libcurl before 7.49.0, when using SSLv3 or making a TLS connection to a URL that uses a numerical IP address, allow remote attackers to spoof servers via an arbitrary valid certificate.

  • CVE-2016-3739 has been assigned by [email protected] to track the vulnerability - currently rated as MEDIUM severity.

CVSS3 Score: 5.3 - MEDIUM

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK HIGH NONE REQUIRED
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED NONE HIGH NONE

CVSS2 Score: 2.6 - LOW

Access
Vector
Access
Complexity
Authentication
NETWORK HIGH NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
NONE PARTIAL NONE

CVE References

Description Tags Link
cURL/libcURL CVE-2016-3739 TLS Certificate Validation Security Bypass Vulnerability cve.report (archive)
text/html
URL Logo BID 90726
curl - TLS certificate check bypass with mbedTLS/PolarSSL Vendor Advisory
curl.haxx.se
text/html
URL Logo CONFIRM curl.haxx.se/docs/adv_20160518.html
Document Display | HPE Support Center h20566.www2.hpe.com
text/html
URL Logo CONFIRM h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
Document Display | HPE Support Center h20566.www2.hpe.com
text/html
URL Logo CONFIRM h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
The Slackware Linux Project: Slackware Security Advisories www.slackware.com
text/html
URL Logo SLACKWARE SSA:2016-141-01
cURL mbedTLS/PolarSSL Function Usage Error Lets Remote Users Bypass Certificate Validation - SecurityTracker www.securitytracker.com
text/html
URL Logo SECTRACK 1035907
Vendor Advisory
curl.haxx.se
text/x-diff
CONFIRM curl.haxx.se/CVE-2016-3739.patch
CPU Oct 2018 www.oracle.com
text/html
URL Logo CONFIRM www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
curl - Changes curl.haxx.se
text/html
URL Logo CONFIRM curl.haxx.se/changes.html#7_49_0
cURL: Multiple vulnerabilities (GLSA 201701-47) — Gentoo security security.gentoo.org
text/html
URL Logo GENTOO GLSA-201701-47

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationHaxxCurl7.21.0AllAllAll
ApplicationHaxxCurl7.21.1AllAllAll
ApplicationHaxxCurl7.21.2AllAllAll
ApplicationHaxxCurl7.21.3AllAllAll
ApplicationHaxxCurl7.21.4AllAllAll
ApplicationHaxxCurl7.21.5AllAllAll
ApplicationHaxxCurl7.21.6AllAllAll
ApplicationHaxxCurl7.21.7AllAllAll
ApplicationHaxxCurl7.22.0AllAllAll
ApplicationHaxxCurl7.23.0AllAllAll
ApplicationHaxxCurl7.23.1AllAllAll
ApplicationHaxxCurl7.24.0AllAllAll
ApplicationHaxxCurl7.25.0AllAllAll
ApplicationHaxxCurl7.26.0AllAllAll
ApplicationHaxxCurl7.27.0AllAllAll
ApplicationHaxxCurl7.28.0AllAllAll
ApplicationHaxxCurl7.28.1AllAllAll
ApplicationHaxxCurl7.29.0AllAllAll
ApplicationHaxxCurl7.30.0AllAllAll
ApplicationHaxxCurl7.31.0AllAllAll
ApplicationHaxxCurl7.32.0AllAllAll
ApplicationHaxxCurl7.33.0AllAllAll
ApplicationHaxxCurl7.34.0AllAllAll
ApplicationHaxxCurl7.35.0AllAllAll
ApplicationHaxxCurl7.36.0AllAllAll
ApplicationHaxxCurl7.38.0AllAllAll
ApplicationHaxxCurl7.39.0AllAllAll
ApplicationHaxxCurl7.40.0AllAllAll
ApplicationHaxxCurl7.41.0AllAllAll
ApplicationHaxxCurl7.42.0AllAllAll
ApplicationHaxxCurl7.42.1AllAllAll
ApplicationHaxxCurl7.43.0AllAllAll
ApplicationHaxxCurl7.44.0AllAllAll
ApplicationHaxxCurl7.45.0AllAllAll
ApplicationHaxxCurl7.46.0AllAllAll
ApplicationHaxxCurl7.47.0AllAllAll
ApplicationHaxxCurl7.48.0AllAllAll
ApplicationHaxxCurl7.21.0AllAllAll
ApplicationHaxxCurl7.21.1AllAllAll
ApplicationHaxxCurl7.21.2AllAllAll
ApplicationHaxxCurl7.21.3AllAllAll
ApplicationHaxxCurl7.21.4AllAllAll
ApplicationHaxxCurl7.21.5AllAllAll
ApplicationHaxxCurl7.21.6AllAllAll
ApplicationHaxxCurl7.21.7AllAllAll
ApplicationHaxxCurl7.22.0AllAllAll
ApplicationHaxxCurl7.23.0AllAllAll
ApplicationHaxxCurl7.23.1AllAllAll
ApplicationHaxxCurl7.24.0AllAllAll
ApplicationHaxxCurl7.25.0AllAllAll
ApplicationHaxxCurl7.26.0AllAllAll
ApplicationHaxxCurl7.27.0AllAllAll
ApplicationHaxxCurl7.28.0AllAllAll
ApplicationHaxxCurl7.28.1AllAllAll
ApplicationHaxxCurl7.29.0AllAllAll
ApplicationHaxxCurl7.30.0AllAllAll
ApplicationHaxxCurl7.31.0AllAllAll
ApplicationHaxxCurl7.32.0AllAllAll
ApplicationHaxxCurl7.33.0AllAllAll
ApplicationHaxxCurl7.34.0AllAllAll
ApplicationHaxxCurl7.35.0AllAllAll
ApplicationHaxxCurl7.36.0AllAllAll
ApplicationHaxxCurl7.38.0AllAllAll
ApplicationHaxxCurl7.39.0AllAllAll
ApplicationHaxxCurl7.40.0AllAllAll
ApplicationHaxxCurl7.41.0AllAllAll
ApplicationHaxxCurl7.42.0AllAllAll
ApplicationHaxxCurl7.42.1AllAllAll
ApplicationHaxxCurl7.43.0AllAllAll
ApplicationHaxxCurl7.44.0AllAllAll
ApplicationHaxxCurl7.45.0AllAllAll
ApplicationHaxxCurl7.46.0AllAllAll
ApplicationHaxxCurl7.47.0AllAllAll
ApplicationHaxxCurl7.48.0AllAllAll
  • cpe:2.3:a:haxx:curl:7.21.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:haxx:curl:7.21.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:haxx:curl:7.21.2:*:*:*:*:*:*:*:
  • cpe:2.3:a:haxx:curl:7.21.3:*:*:*:*:*:*:*:
  • cpe:2.3:a:haxx:curl:7.21.4:*:*:*:*:*:*:*:
  • cpe:2.3:a:haxx:curl:7.21.5:*:*:*:*:*:*:*:
  • cpe:2.3:a:haxx:curl:7.21.6:*:*:*:*:*:*:*:
  • cpe:2.3:a:haxx:curl:7.21.7:*:*:*:*:*:*:*:
  • cpe:2.3:a:haxx:curl:7.22.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:haxx:curl:7.23.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:haxx:curl:7.23.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:haxx:curl:7.24.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:haxx:curl:7.25.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:haxx:curl:7.26.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:haxx:curl:7.27.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:haxx:curl:7.28.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:haxx:curl:7.28.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:haxx:curl:7.29.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:haxx:curl:7.30.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:haxx:curl:7.31.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:haxx:curl:7.32.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:haxx:curl:7.33.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:haxx:curl:7.34.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:haxx:curl:7.35.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:haxx:curl:7.36.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:haxx:curl:7.38.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:haxx:curl:7.39.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:haxx:curl:7.40.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:haxx:curl:7.41.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:haxx:curl:7.42.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:haxx:curl:7.42.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:haxx:curl:7.43.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:haxx:curl:7.44.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:haxx:curl:7.45.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:haxx:curl:7.46.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:haxx:curl:7.47.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:haxx:curl:7.48.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:haxx:curl:7.21.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:haxx:curl:7.21.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:haxx:curl:7.21.2:*:*:*:*:*:*:*:
  • cpe:2.3:a:haxx:curl:7.21.3:*:*:*:*:*:*:*:
  • cpe:2.3:a:haxx:curl:7.21.4:*:*:*:*:*:*:*:
  • cpe:2.3:a:haxx:curl:7.21.5:*:*:*:*:*:*:*:
  • cpe:2.3:a:haxx:curl:7.21.6:*:*:*:*:*:*:*:
  • cpe:2.3:a:haxx:curl:7.21.7:*:*:*:*:*:*:*:
  • cpe:2.3:a:haxx:curl:7.22.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:haxx:curl:7.23.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:haxx:curl:7.23.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:haxx:curl:7.24.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:haxx:curl:7.25.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:haxx:curl:7.26.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:haxx:curl:7.27.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:haxx:curl:7.28.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:haxx:curl:7.28.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:haxx:curl:7.29.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:haxx:curl:7.30.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:haxx:curl:7.31.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:haxx:curl:7.32.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:haxx:curl:7.33.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:haxx:curl:7.34.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:haxx:curl:7.35.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:haxx:curl:7.36.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:haxx:curl:7.38.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:haxx:curl:7.39.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:haxx:curl:7.40.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:haxx:curl:7.41.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:haxx:curl:7.42.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:haxx:curl:7.42.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:haxx:curl:7.43.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:haxx:curl:7.44.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:haxx:curl:7.45.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:haxx:curl:7.46.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:haxx:curl:7.47.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:haxx:curl:7.48.0:*:*:*:*:*:*:*: