CURL-CVE-2016-9952

Source
https://curl.se/docs/CVE-2016-9952.html
Import Source
https://curl.se/docs/CURL-CVE-2016-9952.json
JSON Data
https://api.test.osv.dev/v1/vulns/CURL-CVE-2016-9952
Aliases
Published
2016-12-21T08:00:00Z
Modified
2026-05-21T06:00:09.675292523Z
Summary
Win CE Schannel cert wildcard matches too much
Details

curl's TLS server certificate checks are flawed on Windows CE.

This vulnerability occurs in the verify certificate function when comparing a wildcard certificate name (as returned by the Windows API function CertGetNameString) to the hostname used to make the connection to the server.

The vulnerability can be triggered with an overly permissive wildcard SAN in the server certificate such as a DNS name of *.com. When the function compares the cert name to the connection hostname, the wildcard character is removed from the cert name and the connection hostname is checked to see if it ends with the modified cert name. This means a hostname of example.com would match a DNS SAN of *.com, among other variations. This approach violates recommendations in RFC 6125 and could lead to MITM attacks.

Database specific
{
    "URL": "https://curl.se/docs/CVE-2016-9952.json",
    "severity": "Medium",
    "www": "https://curl.se/docs/CVE-2016-9952.html",
    "last_affected": "7.51.0",
    "CWE": {
        "desc": "Improper Certificate Validation",
        "id": "CWE-295"
    },
    "affects": "both",
    "package": "curl"
}
References
Credits
    • Dan McNulty - FINDER
    • Dan McNulty - REMEDIATION_DEVELOPER

Affected packages

Git / github.com/curl/curl.git

Affected ranges

Type
SEMVER
Events
Introduced
7.27.0
Fixed
7.52.0
Type
GIT
Repo
https://github.com/curl/curl.git
Events

Affected versions

7.*
7.27.0
7.28.0
7.28.1
7.29.0
7.30.0
7.31.0
7.32.0
7.33.0
7.34.0
7.35.0
7.36.0
7.37.0
7.37.1
7.38.0
7.39.0
7.40.0
7.41.0
7.42.0
7.42.1
7.43.0
7.44.0
7.45.0
7.46.0
7.47.0
7.47.1
7.48.0
7.49.0
7.49.1
7.50.0
7.50.1
7.50.2
7.50.3
7.51.0
Other
curl-7_27_0
curl-7_28_0
curl-7_28_1
curl-7_29_0
curl-7_30_0
curl-7_31_0
curl-7_32_0
curl-7_33_0
curl-7_34_0
curl-7_35_0
curl-7_36_0
curl-7_37_0
curl-7_37_1
curl-7_38_0
curl-7_39_0
curl-7_40_0
curl-7_41_0
curl-7_42_0
curl-7_42_1
curl-7_43_0
curl-7_44_0
curl-7_45_0
curl-7_46_0
curl-7_47_0
curl-7_47_1
curl-7_48_0
curl-7_49_0
curl-7_49_1
curl-7_50_0
curl-7_50_1
curl-7_50_2
curl-7_50_3
curl-7_51_0

Database specific

source
"https://curl.se/docs/CURL-CVE-2016-9952.json"