CVE-2024-2466

Source
https://cve.org/CVERecord?id=CVE-2024-2466
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-2466.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-2466
Aliases
Downstream
Related
Published
2024-03-27T07:58:24.520Z
Modified
2026-05-15T11:54:19.202246353Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N CVSS Calculator
Summary
TLS certificate check bypass with mbedTLS
Details

libcurl did not check the server certificate of TLS connections done to a host specified as an IP address, when built to use mbedTLS. libcurl would wrongly avoid using the set hostname function when the specified hostname was given as an IP address, therefore completely skipping the certificate check. This affects all uses of TLS protocols (HTTPS, FTPS, IMAPS, POPS3, SMTPS, etc).

Database specific
{
    "unresolved_ranges": [
        {
            "source": "AFFECTED_FIELD",
            "extracted_events": [
                {
                    "last_affected": "8.6.0"
                },
                {
                    "last_affected": "8.5.0"
                }
            ]
        }
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/2xxx/CVE-2024-2466.json",
    "cna_assigner": "curl"
}
References

Affected packages