curl's TLS server certificate checks are flawed on Windows CE.
This vulnerability occurs in the verify certificate function when comparing a
wildcard certificate name (as returned by the Windows API function
CertGetNameString()
to the hostname used to make the connection to the
server.
The pattern matching logic exhibits an out of bounds read. If the wildcard certificate name field is longer than the connection hostname, the wildcard comparison code performs an access out of bounds of the connection hostname heap based buffer. This issue could technically leak the contents of memory immediately preceding the connection hostname buffer, just a crash or at worst happen to match against another piece of data.
{ "CWE": { "id": "CWE-126", "desc": "Buffer Over-read" }, "package": "curl", "URL": "https://curl.se/docs/CVE-2016-9953.json", "severity": "Medium", "www": "https://curl.se/docs/CVE-2016-9953.html", "last_affected": "7.51.0" }