From CVE report:
----------
cURL and libcurl 7.18.0 through 7.32.0, when built with OpenSSL, disables the certificate CN and SAN name field verification (CURLOPT_SSL_VERIFYHOST) when the digital signature verification (CURLOPT_SSL_VERIFYPEER) is disabled, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
----------
http:// cve.mitre. org/cgi- bin/cvename. cgi?name= CVE-2013- 4545
From CVE report: SSL_VERIFYHOST) when the digital signature verification (CURLOPT_ SSL_VERIFYPEER) is disabled, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
----------
cURL and libcurl 7.18.0 through 7.32.0, when built with OpenSSL, disables the certificate CN and SAN name field verification (CURLOPT_
----------
From developer: http:// curl.haxx. se/docs/ adv_20131115. html
Debian security advisory: http:// www.debian. org/security/ 2013/dsa- 2798
Patch (same fix as upstream and Debian) attached.