CVE-2014-0139

Source
https://nvd.nist.gov/vuln/detail/CVE-2014-0139
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2014-0139.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2014-0139
Aliases
Downstream
Related
Published
2014-04-15T14:55:04Z
Modified
2025-08-09T20:01:26Z
Summary
[none]
Details

cURL and libcurl 7.1 before 7.36.0, when using the OpenSSL, axtls, qsossl or gskit libraries for TLS, recognize a wildcard IP address in the subject's Common Name (CN) field of an X.509 certificate, which might allow man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.

References

Affected packages