libcurl did not check the server certificate of TLS connections done to a host specified as an IP address, when built to use mbedTLS. libcurl would wrongly avoid using the set hostname function when the specified hostname was given as an IP address, therefore completely skipping the certificate check. This affects all uses of TLS protocols (HTTPS, FTPS, IMAPS, POPS3, SMTPS, etc).
Date Added | Due Date | Vulnerability Name | Required Action |
---|---|---|---|
N/A |
Type | Version | Base score | Base severity | Vector |
---|---|---|---|---|
Secondary | 3.1 | 6.5 | MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N |
CWE ID | Type | Source |
---|---|---|
CWE-297 | Secondary | 134c704f-9b21-4f2e-91b3-4a467353bcc0 |
Hyperlink | Source | Resource |
---|---|---|
http://seclists.org/fulldisclosure/2024/Jul/18 | 2499f714-1537-4658-8207-48ae4bb9eae9 | Mailing List Third Party Advisory |
http://seclists.org/fulldisclosure/2024/Jul/19 | 2499f714-1537-4658-8207-48ae4bb9eae9 | Mailing List Third Party Advisory |
http://seclists.org/fulldisclosure/2024/Jul/20 | 2499f714-1537-4658-8207-48ae4bb9eae9 | Mailing List Third Party Advisory |
http://www.openwall.com/lists/oss-security/2024/03/27/4 | 2499f714-1537-4658-8207-48ae4bb9eae9 | Mailing List Third Party Advisory |
https://curl.se/docs/CVE-2024-2466.html | 2499f714-1537-4658-8207-48ae4bb9eae9 | Vendor Advisory |
https://curl.se/docs/CVE-2024-2466.json | 2499f714-1537-4658-8207-48ae4bb9eae9 | Vendor Advisory |
https://hackerone.com/reports/2416725 | 2499f714-1537-4658-8207-48ae4bb9eae9 | Exploit Issue Tracking Third Party Advisory |
https://security.netapp.com/advisory/ntap-20240503-0010/ | 2499f714-1537-4658-8207-48ae4bb9eae9 | Third Party Advisory |
https://support.apple.com/kb/HT214118 | 2499f714-1537-4658-8207-48ae4bb9eae9 | Release Notes Vendor Advisory |
https://support.apple.com/kb/HT214119 | 2499f714-1537-4658-8207-48ae4bb9eae9 | Release Notes Vendor Advisory |
https://support.apple.com/kb/HT214120 | 2499f714-1537-4658-8207-48ae4bb9eae9 | Release Notes Vendor Advisory |
http://seclists.org/fulldisclosure/2024/Jul/18 | af854a3a-2127-422b-91ae-364da2661108 | Mailing List Third Party Advisory |
http://seclists.org/fulldisclosure/2024/Jul/19 | af854a3a-2127-422b-91ae-364da2661108 | Mailing List Third Party Advisory |
http://seclists.org/fulldisclosure/2024/Jul/20 | af854a3a-2127-422b-91ae-364da2661108 | Mailing List Third Party Advisory |
http://www.openwall.com/lists/oss-security/2024/03/27/4 | af854a3a-2127-422b-91ae-364da2661108 | Mailing List Third Party Advisory |
https://curl.se/docs/CVE-2024-2466.html | af854a3a-2127-422b-91ae-364da2661108 | Vendor Advisory |
https://curl.se/docs/CVE-2024-2466.json | af854a3a-2127-422b-91ae-364da2661108 | Vendor Advisory |
https://hackerone.com/reports/2416725 | af854a3a-2127-422b-91ae-364da2661108 | Exploit Issue Tracking Third Party Advisory |
https://security.netapp.com/advisory/ntap-20240503-0010/ | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory |
https://support.apple.com/kb/HT214118 | af854a3a-2127-422b-91ae-364da2661108 | Release Notes Vendor Advisory |
https://support.apple.com/kb/HT214119 | af854a3a-2127-422b-91ae-364da2661108 | Release Notes Vendor Advisory |
https://support.apple.com/kb/HT214120 | af854a3a-2127-422b-91ae-364da2661108 | Release Notes Vendor Advisory |
https://www.vicarius.io/vsociety/posts/tls-certificate-check-bypass-curl-with-mbedtls-cve-2024-2466-2468 | af854a3a-2127-422b-91ae-364da2661108 | Exploit Mitigation Third Party Advisory |