{"id":"CVE-2013-4545","details":"cURL and libcurl 7.18.0 through 7.32.0, when built with OpenSSL, disables the certificate CN and SAN name field verification (CURLOPT_SSL_VERIFYHOST) when the digital signature verification (CURLOPT_SSL_VERIFYPEER) is disabled, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.","aliases":["CURL-CVE-2013-4545"],"modified":"2026-04-16T01:42:48.089430883Z","published":"2013-11-23T11:55:04Z","withdrawn":"2026-01-27T04:12:18.145599Z","related":["SUSE-SU-2015:0962-1","openSUSE-SU-2024:10303-1"],"references":[{"type":"ADVISORY","url":"http://curl.haxx.se/docs/adv_20131115.html"},{"type":"ADVISORY","url":"http://www.debian.org/security/2013/dsa-2798"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2048-1"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-updates/2013-12/msg00047.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-updates/2013-12/msg00053.html"},{"type":"WEB","url":"http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html"},{"type":"WEB","url":"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html"},{"type":"WEB","url":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"},{"type":"WEB","url":"https://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04463322"}],"schema_version":"1.7.3"}