Attacker Value
Unknown
(0 users assessed)
Exploitability
Unknown
(0 users assessed)
User Interaction
Unknown
Privileges Required
Unknown
Attack Vector
Unknown
0

CVE-2014-8151

Disclosure Date: January 15, 2015
Add MITRE ATT&CK tactics and techniques that apply to this CVE.

Description

The darwinssl_connect_step1 function in lib/vtls/curl_darwinssl.c in libcurl 7.31.0 through 7.39.0, when using the DarwinSSL (aka SecureTransport) back-end for TLS, does not check if a cached TLS session validated the certificate when reusing the session, which allows man-in-the-middle attackers to spoof servers via a crafted certificate.

Add Assessment

No one has assessed this topic. Be the first to add your voice to the community.

CVSS V3 Severity and Metrics
Base Score:
None
Impact Score:
Unknown
Exploitability Score:
Unknown
Vector:
Unknown
Attack Vector (AV):
Unknown
Attack Complexity (AC):
Unknown
Privileges Required (PR):
Unknown
User Interaction (UI):
Unknown
Scope (S):
Unknown
Confidentiality (C):
Unknown
Integrity (I):
Unknown
Availability (A):
Unknown

General Information

Vendors

  • apple,
  • haxx

Products

  • libcurl 7.31.0,
  • libcurl 7.32.0,
  • libcurl 7.33.0,
  • libcurl 7.34.0,
  • libcurl 7.35.0,
  • libcurl 7.36.0,
  • libcurl 7.37.0,
  • libcurl 7.37.1,
  • libcurl 7.38.0,
  • libcurl 7.39,
  • mac os x
Technical Analysis