CURL-CVE-2024-2379

Source
https://curl.se/docs/CVE-2024-2379.html
Import Source
https://curl.se/docs/CURL-CVE-2024-2379.json
JSON Data
https://api.osv.dev/v1/vulns/CURL-CVE-2024-2379
Aliases
Published
2024-03-27T08:00:00Z
Modified
2024-03-27T07:12:10.631249Z
Summary
QUIC certificate check bypass with wolfSSL
Details

libcurl skips the certificate verification for a QUIC connection under certain conditions, when built to use wolfSSL. If told to use an unknown/bad cipher or curve, the error path accidentally skips the verification and returns OK, thus ignoring any certificate problems.

Database specific
{
    "CWE": {
        "id": "CWE-295",
        "desc": "Improper Certificate Validation"
    },
    "award": {
        "amount": "540",
        "currency": "USD"
    },
    "URL": "https://curl.se/docs/CVE-2024-2379.json",
    "package": "curl",
    "severity": "Low",
    "issue": "https://hackerone.com/reports/2410774",
    "www": "https://curl.se/docs/CVE-2024-2379.html",
    "last_affected": "8.6.0"
}
References
Credits
    • Dexter Gerig - FINDER
    • Daniel Stenberg - REMEDIATION_DEVELOPER

Affected packages

Git / github.com/curl/curl.git

Affected ranges

Type
SEMVER
Events
Introduced
8.6.0
Fixed
8.7.0
Type
GIT
Repo
https://github.com/curl/curl.git
Events

Affected versions

8.*

8.6.0