The darwinssl_connect_step1 function in lib/vtls/curl_darwinssl.c in libcurl 7.31.0 through 7.39.0, when using the DarwinSSL (aka SecureTransport) back-end for TLS, does not check if a cached TLS session validated the certificate when reusing the session, which allows man-in-the-middle attackers to spoof servers via a crafted certificate.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published: 2015-01-15T15:00:00

Updated: 2024-08-06T13:10:51.108Z

Reserved: 2014-10-10T00:00:00

Link: CVE-2014-8151

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2015-01-15T15:59:07.670

Modified: 2017-07-01T01:29:07.907

Link: CVE-2014-8151

cve-icon Redhat

Severity : Low

Publid Date: 2015-01-08T00:00:00Z

Links: CVE-2014-8151 - Bugzilla