You are here

U-091: cURL Lets Remote Users Decrypt SSL/TLS Traffic

January 30, 2012 - 6:45am

Addthis

PROBLEM:

A vulnerability was reported in cURL.

PLATFORM:

Linux (Any), UNIX (Any), Windows (Any) : Version(s): 7.10.6 through 7.23.1

ABSTRACT:

A remote user can decrypt SSL/TLS sessions in certain cases.

reference  LINKS:

CVE-2011-3389
SecurityTracker Alert ID: 1026587
Vendor Advisory

IMPACT ASSESSMENT:

Moderate

Discussion:

A remote user with the ability to conduct a man-in-the-middle attack can decrypt SSL/TLS sessions. The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a "BEAST" attack.

Impact:

Disclosure of user information

Solution:

The vendor has issued a fix (7.24.0).

 

Addthis