Vulnerabilites related to haxx - libcurl
CVE-2020-8285 (GCVE-0-2020-8285)
Vulnerability from cvelistv5
Published
2020-12-14 19:39
Modified
2024-08-04 09:56
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-674 - Uncontrolled Recursion ()
Summary
curl 7.21.0 to and including 7.73.0 is vulnerable to uncontrolled recursion due to a stack overflow issue in FTP wildcard match parsing.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | https://github.com/curl/curl |
Version: libcurl 7.21.0 to and including 7.73.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T09:56:28.307Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1045844" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/curl/curl/issues/6255" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://curl.se/docs/CVE-2020-8285.html" }, { "name": "FEDORA-2020-ceaf490686", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG/" }, { "name": "[debian-lts-announce] 20201219 [SECURITY] [DLA 2500-1] curl security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00029.html" }, { "name": "FEDORA-2020-7ab62c73bc", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL/" }, { "name": "GLSA-202012-14", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202012-14" }, { "name": "DSA-4881", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2021/dsa-4881" }, { "name": "20210427 APPLE-SA-2021-04-26-3 Security Update 2021-002 Catalina", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2021/Apr/51" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20210122-0007/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT212325" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT212326" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT212327" }, { "name": "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "name": "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "https://github.com/curl/curl", "vendor": "n/a", "versions": [ { "status": "affected", "version": "libcurl 7.21.0 to and including 7.73.0" } ] } ], "descriptions": [ { "lang": "en", "value": "curl 7.21.0 to and including 7.73.0 is vulnerable to uncontrolled recursion due to a stack overflow issue in FTP wildcard match parsing." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-674", "description": "Uncontrolled Recursion (CWE-674)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-19T23:23:28", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1045844" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/curl/curl/issues/6255" }, { "tags": [ "x_refsource_MISC" ], "url": "https://curl.se/docs/CVE-2020-8285.html" }, { "name": "FEDORA-2020-ceaf490686", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG/" }, { "name": "[debian-lts-announce] 20201219 [SECURITY] [DLA 2500-1] curl security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00029.html" }, { "name": "FEDORA-2020-7ab62c73bc", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL/" }, { "name": "GLSA-202012-14", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202012-14" }, { "name": "DSA-4881", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2021/dsa-4881" }, { "name": "20210427 APPLE-SA-2021-04-26-3 Security Update 2021-002 Catalina", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2021/Apr/51" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20210122-0007/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT212325" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT212326" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT212327" }, { "name": "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "name": "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "support@hackerone.com", "ID": "CVE-2020-8285", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "https://github.com/curl/curl", "version": { "version_data": [ { "version_value": "libcurl 7.21.0 to and including 7.73.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "curl 7.21.0 to and including 7.73.0 is vulnerable to uncontrolled recursion due to a stack overflow issue in FTP wildcard match parsing." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Uncontrolled Recursion (CWE-674)" } ] } ] }, "references": { "reference_data": [ { "name": "https://hackerone.com/reports/1045844", "refsource": "MISC", "url": "https://hackerone.com/reports/1045844" }, { "name": "https://github.com/curl/curl/issues/6255", "refsource": "MISC", "url": "https://github.com/curl/curl/issues/6255" }, { "name": "https://curl.se/docs/CVE-2020-8285.html", "refsource": "MISC", "url": "https://curl.se/docs/CVE-2020-8285.html" }, { "name": "FEDORA-2020-ceaf490686", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG/" }, { "name": "[debian-lts-announce] 20201219 [SECURITY] [DLA 2500-1] curl security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00029.html" }, { "name": "FEDORA-2020-7ab62c73bc", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL/" }, { "name": "GLSA-202012-14", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202012-14" }, { "name": "DSA-4881", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4881" }, { "name": "20210427 APPLE-SA-2021-04-26-3 Security Update 2021-002 Catalina", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/Apr/51" }, { "name": "https://www.oracle.com/security-alerts/cpuApr2021.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "name": "https://security.netapp.com/advisory/ntap-20210122-0007/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210122-0007/" }, { "name": "https://support.apple.com/kb/HT212325", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT212325" }, { "name": "https://support.apple.com/kb/HT212326", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT212326" }, { "name": "https://support.apple.com/kb/HT212327", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT212327" }, { "name": "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" }, { "name": "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" }, { "name": "https://www.oracle.com//security-alerts/cpujul2021.html", "refsource": "MISC", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "name": "https://www.oracle.com/security-alerts/cpujan2022.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "name": "https://www.oracle.com/security-alerts/cpuapr2022.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2020-8285", "datePublished": "2020-12-14T19:39:04", "dateReserved": "2020-01-28T00:00:00", "dateUpdated": "2024-08-04T09:56:28.307Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-27535 (GCVE-0-2023-27535)
Vulnerability from cvelistv5
Published
2023-03-30 00:00
Modified
2025-06-09 14:47
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-305 - Authentication Bypass by Primary Weakness ()
Summary
An authentication bypass vulnerability exists in libcurl <8.0.0 in the FTP connection reuse feature that can result in wrong credentials being used during subsequent transfers. Previously created connections are kept in a connection pool for reuse if they match the current setup. However, certain FTP settings such as CURLOPT_FTP_ACCOUNT, CURLOPT_FTP_ALTERNATIVE_TO_USER, CURLOPT_FTP_SSL_CCC, and CURLOPT_USE_SSL were not included in the configuration match checks, causing them to match too easily. This could lead to libcurl using the wrong credentials when performing a transfer, potentially allowing unauthorized access to sensitive information.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | https://github.com/curl/curl |
Version: Fixed in 8.0.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T12:16:35.540Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://hackerone.com/reports/1892780" }, { "name": "FEDORA-2023-7e7414e64d", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20230420-0010/" }, { "name": "[debian-lts-announce] 20230421 [SECURITY] [DLA 3398-1] curl security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html" }, { "name": "GLSA-202310-12", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202310-12" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-27535", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-06-03T18:24:11.710118Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-09T14:47:57.951Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "https://github.com/curl/curl", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Fixed in 8.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "An authentication bypass vulnerability exists in libcurl \u003c8.0.0 in the FTP connection reuse feature that can result in wrong credentials being used during subsequent transfers. Previously created connections are kept in a connection pool for reuse if they match the current setup. However, certain FTP settings such as CURLOPT_FTP_ACCOUNT, CURLOPT_FTP_ALTERNATIVE_TO_USER, CURLOPT_FTP_SSL_CCC, and CURLOPT_USE_SSL were not included in the configuration match checks, causing them to match too easily. This could lead to libcurl using the wrong credentials when performing a transfer, potentially allowing unauthorized access to sensitive information." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-305", "description": "Authentication Bypass by Primary Weakness (CWE-305)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-11T10:06:20.841Z", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "url": "https://hackerone.com/reports/1892780" }, { "name": "FEDORA-2023-7e7414e64d", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/" }, { "url": "https://security.netapp.com/advisory/ntap-20230420-0010/" }, { "name": "[debian-lts-announce] 20230421 [SECURITY] [DLA 3398-1] curl security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html" }, { "name": "GLSA-202310-12", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202310-12" } ] } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2023-27535", "datePublished": "2023-03-30T00:00:00.000Z", "dateReserved": "2023-03-02T00:00:00.000Z", "dateUpdated": "2025-06-09T14:47:57.951Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-38546 (GCVE-0-2023-38546)
Vulnerability from cvelistv5
Published
2023-10-18 03:51
Modified
2025-02-13 17:01
Severity ?
VLAI Severity ?
EPSS score ?
Summary
This flaw allows an attacker to insert cookies at will into a running program
using libcurl, if the specific series of conditions are met.
libcurl performs transfers. In its API, an application creates "easy handles"
that are the individual handles for single transfers.
libcurl provides a function call that duplicates en easy handle called
[curl_easy_duphandle](https://curl.se/libcurl/c/curl_easy_duphandle.html).
If a transfer has cookies enabled when the handle is duplicated, the
cookie-enable state is also cloned - but without cloning the actual
cookies. If the source handle did not read any cookies from a specific file on
disk, the cloned version of the handle would instead store the file name as
`none` (using the four ASCII letters, no quotes).
Subsequent use of the cloned handle that does not explicitly set a source to
load cookies from would then inadvertently load cookies from a file named
`none` - if such a file exists and is readable in the current directory of the
program using libcurl. And if using the correct file format of course.
References
► | URL | Tags | ||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:46:55.785Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://curl.se/docs/CVE-2023-38546.html" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OGMXNRNSJ4ETDK6FRNU3J7SABXPWCHSQ/" }, { "tags": [ "x_transferred" ], "url": "https://support.apple.com/kb/HT214036" }, { "tags": [ "x_transferred" ], "url": "https://support.apple.com/kb/HT214063" }, { "tags": [ "x_transferred" ], "url": "https://support.apple.com/kb/HT214057" }, { "tags": [ "x_transferred" ], "url": "https://support.apple.com/kb/HT214058" }, { "tags": [ "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2024/Jan/34" }, { "tags": [ "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2024/Jan/37" }, { "tags": [ "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2024/Jan/38" }, { "tags": [ "x_transferred" ], "url": "https://forum.vmssoftware.com/viewtopic.php?f=8\u0026t=8868" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-38546", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-13T15:01:53.358515Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-13T15:02:37.137Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "curl", "vendor": "curl", "versions": [ { "lessThan": "8.4.0", "status": "affected", "version": "8.4.0", "versionType": "semver" }, { "lessThan": "7.9.1", "status": "unaffected", "version": "7.9.1", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "This flaw allows an attacker to insert cookies at will into a running program\nusing libcurl, if the specific series of conditions are met.\n\nlibcurl performs transfers. In its API, an application creates \"easy handles\"\nthat are the individual handles for single transfers.\n\nlibcurl provides a function call that duplicates en easy handle called\n[curl_easy_duphandle](https://curl.se/libcurl/c/curl_easy_duphandle.html).\n\nIf a transfer has cookies enabled when the handle is duplicated, the\ncookie-enable state is also cloned - but without cloning the actual\ncookies. If the source handle did not read any cookies from a specific file on\ndisk, the cloned version of the handle would instead store the file name as\n`none` (using the four ASCII letters, no quotes).\n\nSubsequent use of the cloned handle that does not explicitly set a source to\nload cookies from would then inadvertently load cookies from a file named\n`none` - if such a file exists and is readable in the current directory of the\nprogram using libcurl. And if using the correct file format of course." } ], "providerMetadata": { "dateUpdated": "2024-07-09T13:27:34.245Z", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "url": "https://curl.se/docs/CVE-2023-38546.html" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OGMXNRNSJ4ETDK6FRNU3J7SABXPWCHSQ/" }, { "url": "https://support.apple.com/kb/HT214036" }, { "url": "https://support.apple.com/kb/HT214063" }, { "url": "https://support.apple.com/kb/HT214057" }, { "url": "https://support.apple.com/kb/HT214058" }, { "url": "http://seclists.org/fulldisclosure/2024/Jan/34" }, { "url": "http://seclists.org/fulldisclosure/2024/Jan/37" }, { "url": "http://seclists.org/fulldisclosure/2024/Jan/38" }, { "url": "https://forum.vmssoftware.com/viewtopic.php?f=8\u0026t=8868" } ] } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2023-38546", "datePublished": "2023-10-18T03:51:31.276Z", "dateReserved": "2023-07-20T01:00:12.444Z", "dateUpdated": "2025-02-13T17:01:53.507Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2014-3613 (GCVE-0-2014-3613)
Vulnerability from cvelistv5
Published
2014-11-18 15:00
Modified
2024-08-06 10:50
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
cURL and libcurl before 7.38.0 does not properly handle IP addresses in cookie domain names, which allows remote attackers to set cookies for or send arbitrary cookies to certain sites, as demonstrated by a site at 192.168.0.1 setting cookies for a site at 127.168.0.1.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:50:17.964Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://curl.haxx.se/docs/adv_20140910A.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "name": "APPLE-SA-2015-08-13-2", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html" }, { "name": "RHSA-2015:1254", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1254.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10743" }, { "name": "openSUSE-SU-2014:1139", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00024.html" }, { "name": "69748", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/69748" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT205031" }, { "name": "DSA-3022", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2014/dsa-3022" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-09-10T00:00:00", "descriptions": [ { "lang": "en", "value": "cURL and libcurl before 7.38.0 does not properly handle IP addresses in cookie domain names, which allows remote attackers to set cookies for or send arbitrary cookies to certain sites, as demonstrated by a site at 192.168.0.1 setting cookies for a site at 127.168.0.1." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-04T19:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://curl.haxx.se/docs/adv_20140910A.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "name": "APPLE-SA-2015-08-13-2", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html" }, { "name": "RHSA-2015:1254", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1254.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10743" }, { "name": "openSUSE-SU-2014:1139", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00024.html" }, { "name": "69748", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/69748" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT205031" }, { "name": "DSA-3022", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2014/dsa-3022" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-3613", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "cURL and libcurl before 7.38.0 does not properly handle IP addresses in cookie domain names, which allows remote attackers to set cookies for or send arbitrary cookies to certain sites, as demonstrated by a site at 192.168.0.1 setting cookies for a site at 127.168.0.1." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "name": "http://curl.haxx.se/docs/adv_20140910A.html", "refsource": "CONFIRM", "url": "http://curl.haxx.se/docs/adv_20140910A.html" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "name": "APPLE-SA-2015-08-13-2", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html" }, { "name": "RHSA-2015:1254", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2015-1254.html" }, { "name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10743", "refsource": "CONFIRM", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10743" }, { "name": "openSUSE-SU-2014:1139", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00024.html" }, { "name": "69748", "refsource": "BID", "url": "http://www.securityfocus.com/bid/69748" }, { "name": "https://support.apple.com/kb/HT205031", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT205031" }, { "name": "DSA-3022", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2014/dsa-3022" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2014-3613", "datePublished": "2014-11-18T15:00:00", "dateReserved": "2014-05-14T00:00:00", "dateUpdated": "2024-08-06T10:50:17.964Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-8818 (GCVE-0-2017-8818)
Vulnerability from cvelistv5
Published
2017-11-29 18:00
Modified
2024-08-05 16:48
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- out-of-bounds access
Summary
curl and libcurl before 7.57.0 on 32-bit platforms allow attackers to cause a denial of service (out-of-bounds access and application crash) or possibly have unspecified other impact because too little memory is allocated for interfacing to an SSL library.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | curl and libcurl before 7.57.0 |
Version: curl and libcurl before 7.57.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T16:48:22.387Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-201712-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201712-04" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://curl.haxx.se/docs/adv_2017-af0a.html" }, { "name": "1039898", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1039898" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://security.cucumberlinux.com/security/details.php?id=163" }, { "name": "102014", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/102014" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "curl and libcurl before 7.57.0", "vendor": "n/a", "versions": [ { "status": "affected", "version": "curl and libcurl before 7.57.0" } ] } ], "datePublic": "2017-11-29T00:00:00", "descriptions": [ { "lang": "en", "value": "curl and libcurl before 7.57.0 on 32-bit platforms allow attackers to cause a denial of service (out-of-bounds access and application crash) or possibly have unspecified other impact because too little memory is allocated for interfacing to an SSL library." } ], "problemTypes": [ { "descriptions": [ { "description": "out-of-bounds access", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-12-15T10:57:01", "orgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "shortName": "debian" }, "references": [ { "name": "GLSA-201712-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201712-04" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://curl.haxx.se/docs/adv_2017-af0a.html" }, { "name": "1039898", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1039898" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://security.cucumberlinux.com/security/details.php?id=163" }, { "name": "102014", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/102014" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@debian.org", "ID": "CVE-2017-8818", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "curl and libcurl before 7.57.0", "version": { "version_data": [ { "version_value": "curl and libcurl before 7.57.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "curl and libcurl before 7.57.0 on 32-bit platforms allow attackers to cause a denial of service (out-of-bounds access and application crash) or possibly have unspecified other impact because too little memory is allocated for interfacing to an SSL library." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "out-of-bounds access" } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-201712-04", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201712-04" }, { "name": "https://curl.haxx.se/docs/adv_2017-af0a.html", "refsource": "CONFIRM", "url": "https://curl.haxx.se/docs/adv_2017-af0a.html" }, { "name": "1039898", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1039898" }, { "name": "http://security.cucumberlinux.com/security/details.php?id=163", "refsource": "CONFIRM", "url": "http://security.cucumberlinux.com/security/details.php?id=163" }, { "name": "102014", "refsource": "BID", "url": "http://www.securityfocus.com/bid/102014" } ] } } } }, "cveMetadata": { "assignerOrgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "assignerShortName": "debian", "cveId": "CVE-2017-8818", "datePublished": "2017-11-29T18:00:00", "dateReserved": "2017-05-07T00:00:00", "dateUpdated": "2024-08-05T16:48:22.387Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-6874 (GCVE-0-2024-6874)
Vulnerability from cvelistv5
Published
2024-07-24 07:36
Modified
2025-02-13 17:58
Severity ?
VLAI Severity ?
EPSS score ?
Summary
libcurl's URL API function
[curl_url_get()](https://curl.se/libcurl/c/curl_url_get.html) offers punycode
conversions, to and from IDN. Asking to convert a name that is exactly 256
bytes, libcurl ends up reading outside of a stack based buffer when built to
use the *macidn* IDN backend. The conversion function then fills up the
provided buffer exactly - but does not null terminate the string.
This flaw can lead to stack contents accidently getting returned as part of
the converted string.
References
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:curl:libcurl:8.8.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "libcurl", "vendor": "curl", "versions": [ { "status": "affected", "version": "8.8.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-6874", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-24T16:13:40.560966Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-24T16:25:51.575Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-22T18:03:17.766Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "json", "tags": [ "x_transferred" ], "url": "https://curl.se/docs/CVE-2024-6874.json" }, { "name": "www", "tags": [ "x_transferred" ], "url": "https://curl.se/docs/CVE-2024-6874.html" }, { "name": "issue", "tags": [ "x_transferred" ], "url": "https://hackerone.com/reports/2604391" }, { "tags": [ "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2024/07/24/2" }, { "url": "https://security.netapp.com/advisory/ntap-20240822-0004/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "curl", "vendor": "curl", "versions": [ { "lessThanOrEqual": "8.8.0", "status": "affected", "version": "8.8.0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "z2_" }, { "lang": "en", "type": "remediation developer", "value": "z2_" } ], "descriptions": [ { "lang": "en", "value": "libcurl\u0027s URL API function\n[curl_url_get()](https://curl.se/libcurl/c/curl_url_get.html) offers punycode\nconversions, to and from IDN. Asking to convert a name that is exactly 256\nbytes, libcurl ends up reading outside of a stack based buffer when built to\nuse the *macidn* IDN backend. The conversion function then fills up the\nprovided buffer exactly - but does not null terminate the string.\n\nThis flaw can lead to stack contents accidently getting returned as part of\nthe converted string." } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-126 Buffer Over-read", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-24T07:40:07.072Z", "orgId": "2499f714-1537-4658-8207-48ae4bb9eae9", "shortName": "curl" }, "references": [ { "name": "json", "url": "https://curl.se/docs/CVE-2024-6874.json" }, { "name": "www", "url": "https://curl.se/docs/CVE-2024-6874.html" }, { "name": "issue", "url": "https://hackerone.com/reports/2604391" }, { "url": "http://www.openwall.com/lists/oss-security/2024/07/24/2" } ], "title": "macidn punycode buffer overread" } }, "cveMetadata": { "assignerOrgId": "2499f714-1537-4658-8207-48ae4bb9eae9", "assignerShortName": "curl", "cveId": "CVE-2024-6874", "datePublished": "2024-07-24T07:36:26.887Z", "dateReserved": "2024-07-18T03:37:32.294Z", "dateUpdated": "2025-02-13T17:58:00.151Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2015-3148 (GCVE-0-2015-3148)
Vulnerability from cvelistv5
Published
2015-04-24 14:00
Modified
2024-08-06 05:39
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
cURL and libcurl 7.10.6 through 7.41.0 do not properly re-use authenticated Negotiate connections, which allows remote attackers to connect as other users via a request.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T05:39:31.988Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "HPSBHF03544", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=145612005512270\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://curl.haxx.se/docs/adv_20150422B.html" }, { "name": "FEDORA-2015-6853", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157188.html" }, { "name": "DSA-3232", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2015/dsa-3232" }, { "name": "FEDORA-2015-6712", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156250.html" }, { "name": "74301", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/74301" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "name": "MDVSA-2015:219", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:219" }, { "name": "USN-2591-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2591-1" }, { "name": "1032232", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1032232" }, { "name": "APPLE-SA-2015-08-13-2", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html" }, { "name": "RHSA-2015:1254", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1254.html" }, { "name": "MDVSA-2015:220", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:220" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10743" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html" }, { "name": "openSUSE-SU-2015:0799", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00057.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://advisories.mageia.org/MGASA-2015-0179.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT205031" }, { "name": "GLSA-201509-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201509-02" }, { "name": "FEDORA-2015-6728", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157017.html" }, { "name": "FEDORA-2015-6695", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155957.html" }, { "name": "FEDORA-2015-6864", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156945.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-04-22T00:00:00", "descriptions": [ { "lang": "en", "value": "cURL and libcurl 7.10.6 through 7.41.0 do not properly re-use authenticated Negotiate connections, which allows remote attackers to connect as other users via a request." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-04T19:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "HPSBHF03544", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=145612005512270\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://curl.haxx.se/docs/adv_20150422B.html" }, { "name": "FEDORA-2015-6853", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157188.html" }, { "name": "DSA-3232", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2015/dsa-3232" }, { "name": "FEDORA-2015-6712", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156250.html" }, { "name": "74301", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/74301" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "name": "MDVSA-2015:219", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:219" }, { "name": "USN-2591-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2591-1" }, { "name": "1032232", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1032232" }, { "name": "APPLE-SA-2015-08-13-2", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html" }, { "name": "RHSA-2015:1254", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1254.html" }, { "name": "MDVSA-2015:220", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:220" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10743" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html" }, { "name": "openSUSE-SU-2015:0799", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00057.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://advisories.mageia.org/MGASA-2015-0179.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT205031" }, { "name": "GLSA-201509-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201509-02" }, { "name": "FEDORA-2015-6728", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157017.html" }, { "name": "FEDORA-2015-6695", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155957.html" }, { "name": "FEDORA-2015-6864", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156945.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2015-3148", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "cURL and libcurl 7.10.6 through 7.41.0 do not properly re-use authenticated Negotiate connections, which allows remote attackers to connect as other users via a request." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "HPSBHF03544", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=145612005512270\u0026w=2" }, { "name": "http://curl.haxx.se/docs/adv_20150422B.html", "refsource": "CONFIRM", "url": "http://curl.haxx.se/docs/adv_20150422B.html" }, { "name": "FEDORA-2015-6853", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157188.html" }, { "name": "DSA-3232", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2015/dsa-3232" }, { "name": "FEDORA-2015-6712", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156250.html" }, { "name": "74301", "refsource": "BID", "url": "http://www.securityfocus.com/bid/74301" }, { "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "name": "MDVSA-2015:219", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:219" }, { "name": "USN-2591-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2591-1" }, { "name": "1032232", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1032232" }, { "name": "APPLE-SA-2015-08-13-2", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html" }, { "name": "RHSA-2015:1254", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2015-1254.html" }, { "name": "MDVSA-2015:220", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:220" }, { "name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10743", "refsource": "CONFIRM", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10743" }, { "name": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html" }, { "name": "openSUSE-SU-2015:0799", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00057.html" }, { "name": "http://advisories.mageia.org/MGASA-2015-0179.html", "refsource": "CONFIRM", "url": "http://advisories.mageia.org/MGASA-2015-0179.html" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763" }, { "name": "https://support.apple.com/kb/HT205031", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT205031" }, { "name": "GLSA-201509-02", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201509-02" }, { "name": "FEDORA-2015-6728", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157017.html" }, { "name": "FEDORA-2015-6695", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155957.html" }, { "name": "FEDORA-2015-6864", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156945.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2015-3148", "datePublished": "2015-04-24T14:00:00", "dateReserved": "2015-04-10T00:00:00", "dateUpdated": "2024-08-06T05:39:31.988Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-1000257 (GCVE-0-2017-1000257)
Vulnerability from cvelistv5
Published
2017-10-31 21:00
Modified
2024-08-05 22:00
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
An IMAP FETCH response line indicates the size of the returned data, in number of bytes. When that response says the data is zero bytes, libcurl would pass on that (non-existing) data with a pointer and the size (zero) to the deliver-data function. libcurl's deliver-data function treats zero as a magic number and invokes strlen() on the data to figure out the length. The strlen() is called on a heap based buffer that might not be zero terminated so libcurl might read beyond the end of it into whatever memory lies after (or just crash) and then deliver that to the application as if it was actually downloaded.
References
► | URL | Tags | ||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T22:00:39.661Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://curl.haxx.se/docs/adv_20171023.html" }, { "name": "RHSA-2017:3263", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:3263" }, { "name": "GLSA-201712-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201712-04" }, { "name": "1039644", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1039644" }, { "name": "RHSA-2018:3558", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:3558" }, { "name": "101519", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/101519" }, { "name": "DSA-4007", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2017/dsa-4007" }, { "name": "RHSA-2018:2486", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "dateAssigned": "2017-10-17T00:00:00", "datePublic": "2017-10-31T00:00:00", "descriptions": [ { "lang": "en", "value": "An IMAP FETCH response line indicates the size of the returned data, in number of bytes. When that response says the data is zero bytes, libcurl would pass on that (non-existing) data with a pointer and the size (zero) to the deliver-data function. libcurl\u0027s deliver-data function treats zero as a magic number and invokes strlen() on the data to figure out the length. The strlen() is called on a heap based buffer that might not be zero terminated so libcurl might read beyond the end of it into whatever memory lies after (or just crash) and then deliver that to the application as if it was actually downloaded." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-11-13T10:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://curl.haxx.se/docs/adv_20171023.html" }, { "name": "RHSA-2017:3263", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:3263" }, { "name": "GLSA-201712-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201712-04" }, { "name": "1039644", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1039644" }, { "name": "RHSA-2018:3558", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:3558" }, { "name": "101519", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/101519" }, { "name": "DSA-4007", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2017/dsa-4007" }, { "name": "RHSA-2018:2486", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "DATE_ASSIGNED": "2017-10-17", "ID": "CVE-2017-1000257", "REQUESTER": "daniel@haxx.se", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An IMAP FETCH response line indicates the size of the returned data, in number of bytes. When that response says the data is zero bytes, libcurl would pass on that (non-existing) data with a pointer and the size (zero) to the deliver-data function. libcurl\u0027s deliver-data function treats zero as a magic number and invokes strlen() on the data to figure out the length. The strlen() is called on a heap based buffer that might not be zero terminated so libcurl might read beyond the end of it into whatever memory lies after (or just crash) and then deliver that to the application as if it was actually downloaded." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://curl.haxx.se/docs/adv_20171023.html", "refsource": "CONFIRM", "url": "https://curl.haxx.se/docs/adv_20171023.html" }, { "name": "RHSA-2017:3263", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:3263" }, { "name": "GLSA-201712-04", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201712-04" }, { "name": "1039644", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1039644" }, { "name": "RHSA-2018:3558", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:3558" }, { "name": "101519", "refsource": "BID", "url": "http://www.securityfocus.com/bid/101519" }, { "name": "DSA-4007", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2017/dsa-4007" }, { "name": "RHSA-2018:2486", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-1000257", "datePublished": "2017-10-31T21:00:00", "dateReserved": "2017-10-31T00:00:00", "dateUpdated": "2024-08-05T22:00:39.661Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-8231 (GCVE-0-2020-8231)
Vulnerability from cvelistv5
Published
2020-12-14 19:39
Modified
2024-08-04 09:56
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-416 - Use After Free ()
Summary
Due to use of a dangling pointer, libcurl 7.29.0 through 7.71.1 can use the wrong connection when sending data.
References
► | URL | Tags | ||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | https://github.com/curl/curl |
Version: libcurl 7.29.0 to and including 7.71.1 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T09:56:27.965Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/948876" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://curl.haxx.se/docs/CVE-2020-8231.html" }, { "name": "GLSA-202012-14", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202012-14" }, { "name": "DSA-4881", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2021/dsa-4881" }, { "name": "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "name": "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "https://github.com/curl/curl", "vendor": "n/a", "versions": [ { "status": "affected", "version": "libcurl 7.29.0 to and including 7.71.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Due to use of a dangling pointer, libcurl 7.29.0 through 7.71.1 can use the wrong connection when sending data." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "Use After Free (CWE-416)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-19T23:23:23", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/948876" }, { "tags": [ "x_refsource_MISC" ], "url": "https://curl.haxx.se/docs/CVE-2020-8231.html" }, { "name": "GLSA-202012-14", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202012-14" }, { "name": "DSA-4881", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2021/dsa-4881" }, { "name": "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "name": "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "support@hackerone.com", "ID": "CVE-2020-8231", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "https://github.com/curl/curl", "version": { "version_data": [ { "version_value": "libcurl 7.29.0 to and including 7.71.1" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Due to use of a dangling pointer, libcurl 7.29.0 through 7.71.1 can use the wrong connection when sending data." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Use After Free (CWE-416)" } ] } ] }, "references": { "reference_data": [ { "name": "https://hackerone.com/reports/948876", "refsource": "MISC", "url": "https://hackerone.com/reports/948876" }, { "name": "https://curl.haxx.se/docs/CVE-2020-8231.html", "refsource": "MISC", "url": "https://curl.haxx.se/docs/CVE-2020-8231.html" }, { "name": "GLSA-202012-14", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202012-14" }, { "name": "DSA-4881", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4881" }, { "name": "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" }, { "name": "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" }, { "name": "https://www.oracle.com/security-alerts/cpuapr2022.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2020-8231", "datePublished": "2020-12-14T19:39:19", "dateReserved": "2020-01-28T00:00:00", "dateUpdated": "2024-08-04T09:56:27.965Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-1000100 (GCVE-0-2017-1000100)
Vulnerability from cvelistv5
Published
2017-10-04 01:00
Modified
2024-08-05 21:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
When doing a TFTP transfer and curl/libcurl is given a URL that contains a very long file name (longer than about 515 bytes), the file name is truncated to fit within the buffer boundaries, but the buffer size is still wrongly updated to use the untruncated length. This too large value is then used in the sendto() call, making curl attempt to send more data than what is actually put into the buffer. The endto() function will then read beyond the end of the heap based buffer. A malicious HTTP(S) server could redirect a vulnerable libcurl-using client to a crafted TFTP URL (if the client hasn't restricted which protocols it allows redirects to) and trick it to send private memory contents to a remote server over UDP. Limit curl's redirect protocols with --proto-redir and libcurl's with CURLOPT_REDIR_PROTOCOLS.
References
► | URL | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T21:53:06.527Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/HT208221" }, { "name": "100286", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/100286" }, { "name": "RHSA-2018:3558", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:3558" }, { "name": "GLSA-201709-14", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201709-14" }, { "name": "1039118", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1039118" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://curl.haxx.se/docs/adv_20170809B.html" }, { "name": "DSA-3992", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2017/dsa-3992" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "dateAssigned": "2017-08-22T00:00:00", "datePublic": "2017-10-03T00:00:00", "descriptions": [ { "lang": "en", "value": "When doing a TFTP transfer and curl/libcurl is given a URL that contains a very long file name (longer than about 515 bytes), the file name is truncated to fit within the buffer boundaries, but the buffer size is still wrongly updated to use the untruncated length. This too large value is then used in the sendto() call, making curl attempt to send more data than what is actually put into the buffer. The endto() function will then read beyond the end of the heap based buffer. A malicious HTTP(S) server could redirect a vulnerable libcurl-using client to a crafted TFTP URL (if the client hasn\u0027t restricted which protocols it allows redirects to) and trick it to send private memory contents to a remote server over UDP. Limit curl\u0027s redirect protocols with --proto-redir and libcurl\u0027s with CURLOPT_REDIR_PROTOCOLS." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-11-13T10:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/HT208221" }, { "name": "100286", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/100286" }, { "name": "RHSA-2018:3558", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:3558" }, { "name": "GLSA-201709-14", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201709-14" }, { "name": "1039118", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1039118" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://curl.haxx.se/docs/adv_20170809B.html" }, { "name": "DSA-3992", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2017/dsa-3992" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "DATE_ASSIGNED": "2017-08-22T17:29:33.315894", "ID": "CVE-2017-1000100", "REQUESTER": "daniel@haxx.se", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "When doing a TFTP transfer and curl/libcurl is given a URL that contains a very long file name (longer than about 515 bytes), the file name is truncated to fit within the buffer boundaries, but the buffer size is still wrongly updated to use the untruncated length. This too large value is then used in the sendto() call, making curl attempt to send more data than what is actually put into the buffer. The endto() function will then read beyond the end of the heap based buffer. A malicious HTTP(S) server could redirect a vulnerable libcurl-using client to a crafted TFTP URL (if the client hasn\u0027t restricted which protocols it allows redirects to) and trick it to send private memory contents to a remote server over UDP. Limit curl\u0027s redirect protocols with --proto-redir and libcurl\u0027s with CURLOPT_REDIR_PROTOCOLS." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.apple.com/HT208221", "refsource": "CONFIRM", "url": "https://support.apple.com/HT208221" }, { "name": "100286", "refsource": "BID", "url": "http://www.securityfocus.com/bid/100286" }, { "name": "RHSA-2018:3558", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:3558" }, { "name": "GLSA-201709-14", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201709-14" }, { "name": "1039118", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1039118" }, { "name": "https://curl.haxx.se/docs/adv_20170809B.html", "refsource": "CONFIRM", "url": "https://curl.haxx.se/docs/adv_20170809B.html" }, { "name": "DSA-3992", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2017/dsa-3992" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-1000100", "datePublished": "2017-10-04T01:00:00", "dateReserved": "2017-10-03T00:00:00", "dateUpdated": "2024-08-05T21:53:06.527Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-27536 (GCVE-0-2023-27536)
Vulnerability from cvelistv5
Published
2023-03-30 00:00
Modified
2025-02-14 15:39
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-305 - Authentication Bypass by Primary Weakness ()
Summary
An authentication bypass vulnerability exists libcurl <8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | https://github.com/curl/curl |
Version: Fixed in 8.0.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T12:16:35.616Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://hackerone.com/reports/1895135" }, { "name": "FEDORA-2023-7e7414e64d", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20230420-0010/" }, { "name": "[debian-lts-announce] 20230421 [SECURITY] [DLA 3398-1] curl security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html" }, { "name": "GLSA-202310-12", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202310-12" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-27536", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-14T15:39:19.648695Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-14T15:39:25.676Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "https://github.com/curl/curl", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Fixed in 8.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "An authentication bypass vulnerability exists libcurl \u003c8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-305", "description": "Authentication Bypass by Primary Weakness (CWE-305)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-11T10:06:17.316Z", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "url": "https://hackerone.com/reports/1895135" }, { "name": "FEDORA-2023-7e7414e64d", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/" }, { "url": "https://security.netapp.com/advisory/ntap-20230420-0010/" }, { "name": "[debian-lts-announce] 20230421 [SECURITY] [DLA 3398-1] curl security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html" }, { "name": "GLSA-202310-12", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202310-12" } ] } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2023-27536", "datePublished": "2023-03-30T00:00:00.000Z", "dateReserved": "2023-03-02T00:00:00.000Z", "dateUpdated": "2025-02-14T15:39:25.676Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2014-0015 (GCVE-0-2014-0015)
Vulnerability from cvelistv5
Published
2014-02-02 00:00
Modified
2024-08-06 08:58
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
cURL and libcurl 7.10.6 through 7.34.0, when more than one authentication method is enabled, re-uses NTLM connections, which might allow context-dependent attackers to authenticate as other users via a request.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T08:58:26.535Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "56912", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/56912" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095862" }, { "name": "SSA:2014-044-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred" ], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2014\u0026m=slackware-security.502652" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT6296" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html" }, { "name": "1029710", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1029710" }, { "name": "FEDORA-2014-1876", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127627.html" }, { "name": "openSUSE-SU-2014:0274", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-02/msg00066.html" }, { "name": "APPLE-SA-2014-06-30-2", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2014-06/0172.html" }, { "name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded" }, { "name": "65270", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/65270" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html" }, { "name": "DSA-2849", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2014/dsa-2849" }, { "name": "59458", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59458" }, { "name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2014/Dec/23" }, { "name": "56728", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/56728" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10743" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html" }, { "name": "FEDORA-2014-1864", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128408.html" }, { "name": "59475", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59475" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://curl.haxx.se/docs/adv_20140129.html" }, { "name": "USN-2097-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2097-1" }, { "name": "56734", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/56734" }, { "name": "56731", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/56731" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-01-31T00:00:00", "descriptions": [ { "lang": "en", "value": "cURL and libcurl 7.10.6 through 7.34.0, when more than one authentication method is enabled, re-uses NTLM connections, which might allow context-dependent attackers to authenticate as other users via a request." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "56912", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/56912" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095862" }, { "name": "SSA:2014-044-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE" ], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2014\u0026m=slackware-security.502652" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT6296" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html" }, { "name": "1029710", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1029710" }, { "name": "FEDORA-2014-1876", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127627.html" }, { "name": "openSUSE-SU-2014:0274", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-02/msg00066.html" }, { "name": "APPLE-SA-2014-06-30-2", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2014-06/0172.html" }, { "name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded" }, { "name": "65270", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/65270" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html" }, { "name": "DSA-2849", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2014/dsa-2849" }, { "name": "59458", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59458" }, { "name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2014/Dec/23" }, { "name": "56728", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/56728" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10743" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html" }, { "name": "FEDORA-2014-1864", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128408.html" }, { "name": "59475", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59475" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://curl.haxx.se/docs/adv_20140129.html" }, { "name": "USN-2097-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2097-1" }, { "name": "56734", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/56734" }, { "name": "56731", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/56731" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-0015", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "cURL and libcurl 7.10.6 through 7.34.0, when more than one authentication method is enabled, re-uses NTLM connections, which might allow context-dependent attackers to authenticate as other users via a request." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "56912", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/56912" }, { "name": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095862", "refsource": "CONFIRM", "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095862" }, { "name": "SSA:2014-044-01", "refsource": "SLACKWARE", "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2014\u0026m=slackware-security.502652" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "name": "http://support.apple.com/kb/HT6296", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT6296" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html" }, { "name": "1029710", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1029710" }, { "name": "FEDORA-2014-1876", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127627.html" }, { "name": "openSUSE-SU-2014:0274", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2014-02/msg00066.html" }, { "name": "APPLE-SA-2014-06-30-2", "refsource": "APPLE", "url": "http://archives.neohapsis.com/archives/bugtraq/2014-06/0172.html" }, { "name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded" }, { "name": "65270", "refsource": "BID", "url": "http://www.securityfocus.com/bid/65270" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html" }, { "name": "DSA-2849", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2014/dsa-2849" }, { "name": "59458", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59458" }, { "name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2014/Dec/23" }, { "name": "56728", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/56728" }, { "name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10743", "refsource": "CONFIRM", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10743" }, { "name": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html" }, { "name": "FEDORA-2014-1864", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128408.html" }, { "name": "59475", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59475" }, { "name": "http://curl.haxx.se/docs/adv_20140129.html", "refsource": "CONFIRM", "url": "http://curl.haxx.se/docs/adv_20140129.html" }, { "name": "USN-2097-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2097-1" }, { "name": "56734", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/56734" }, { "name": "56731", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/56731" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2014-0015", "datePublished": "2014-02-02T00:00:00", "dateReserved": "2013-12-03T00:00:00", "dateUpdated": "2024-08-06T08:58:26.535Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-3822 (GCVE-0-2019-3822)
Vulnerability from cvelistv5
Published
2019-02-06 20:00
Modified
2024-08-04 19:19
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
libcurl versions from 7.36.0 to before 7.64.0 are vulnerable to a stack-based buffer overflow. The function creating an outgoing NTLM type-3 header (`lib/vauth/ntlm.c:Curl_auth_create_ntlm_type3_message()`), generates the request HTTP header contents based on previously received data. The check that exists to prevent the local buffer from getting overflowed is implemented wrongly (using unsigned math) and as such it does not prevent the overflow from happening. This output data can grow larger than the local buffer if very large 'nt response' data is extracted from a previous NTLMv2 header provided by the malicious or broken HTTP server. Such a 'large value' needs to be around 1000 bytes or more. The actual payload data copied to the target buffer comes from the NTLMv2 type-2 response header.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
The curl Project | curl |
Version: 7.64.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T19:19:18.599Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-201903-03", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201903-03" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3822" }, { "name": "DSA-4386", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2019/dsa-4386" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://curl.haxx.se/docs/CVE-2019-3822.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20190315-0001/" }, { "name": "USN-3882-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3882-1/" }, { "name": "106950", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/106950" }, { "name": "[infra-devnull] 20190404 [GitHub] [incubator-openwhisk-runtime-ballerina] falkzoll commented on issue #15: Update to new base image jdk8u202-b08_openj9-0.12.1.", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f%40%3Cdevnull.infra.apache.org%3E" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-436177.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20190719-0004/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.f5.com/csp/article/K84141449" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.f5.com/csp/article/K84141449?utm_source=f5support\u0026amp%3Butm_medium=RSS" }, { "name": "RHSA-2019:3701", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:3701" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "curl", "vendor": "The curl Project", "versions": [ { "status": "affected", "version": "7.64.0" } ] } ], "datePublic": "2019-02-06T00:00:00", "descriptions": [ { "lang": "en", "value": "libcurl versions from 7.36.0 to before 7.64.0 are vulnerable to a stack-based buffer overflow. The function creating an outgoing NTLM type-3 header (`lib/vauth/ntlm.c:Curl_auth_create_ntlm_type3_message()`), generates the request HTTP header contents based on previously received data. The check that exists to prevent the local buffer from getting overflowed is implemented wrongly (using unsigned math) and as such it does not prevent the overflow from happening. This output data can grow larger than the local buffer if very large \u0027nt response\u0027 data is extracted from a previous NTLMv2 header provided by the malicious or broken HTTP server. Such a \u0027large value\u0027 needs to be around 1000 bytes or more. The actual payload data copied to the target buffer comes from the NTLMv2 type-2 response header." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-121", "description": "CWE-121", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-11-06T00:08:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "GLSA-201903-03", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201903-03" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3822" }, { "name": "DSA-4386", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2019/dsa-4386" }, { "tags": [ "x_refsource_MISC" ], "url": "https://curl.haxx.se/docs/CVE-2019-3822.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20190315-0001/" }, { "name": "USN-3882-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3882-1/" }, { "name": "106950", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/106950" }, { "name": "[infra-devnull] 20190404 [GitHub] [incubator-openwhisk-runtime-ballerina] falkzoll commented on issue #15: Update to new base image jdk8u202-b08_openj9-0.12.1.", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f%40%3Cdevnull.infra.apache.org%3E" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-436177.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20190719-0004/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.f5.com/csp/article/K84141449" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.f5.com/csp/article/K84141449?utm_source=f5support\u0026amp%3Butm_medium=RSS" }, { "name": "RHSA-2019:3701", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:3701" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2019-3822", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "curl", "version": { "version_data": [ { "version_value": "7.64.0" } ] } } ] }, "vendor_name": "The curl Project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "libcurl versions from 7.36.0 to before 7.64.0 are vulnerable to a stack-based buffer overflow. The function creating an outgoing NTLM type-3 header (`lib/vauth/ntlm.c:Curl_auth_create_ntlm_type3_message()`), generates the request HTTP header contents based on previously received data. The check that exists to prevent the local buffer from getting overflowed is implemented wrongly (using unsigned math) and as such it does not prevent the overflow from happening. This output data can grow larger than the local buffer if very large \u0027nt response\u0027 data is extracted from a previous NTLMv2 header provided by the malicious or broken HTTP server. Such a \u0027large value\u0027 needs to be around 1000 bytes or more. The actual payload data copied to the target buffer comes from the NTLMv2 type-2 response header." } ] }, "impact": { "cvss": [ [ { "vectorString": "7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H", "version": "3.0" } ] ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-121" } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-201903-03", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201903-03" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3822", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3822" }, { "name": "DSA-4386", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2019/dsa-4386" }, { "name": "https://curl.haxx.se/docs/CVE-2019-3822.html", "refsource": "MISC", "url": "https://curl.haxx.se/docs/CVE-2019-3822.html" }, { "name": "https://security.netapp.com/advisory/ntap-20190315-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20190315-0001/" }, { "name": "USN-3882-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3882-1/" }, { "name": "106950", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106950" }, { "name": "[infra-devnull] 20190404 [GitHub] [incubator-openwhisk-runtime-ballerina] falkzoll commented on issue #15: Update to new base image jdk8u202-b08_openj9-0.12.1.", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f@%3Cdevnull.infra.apache.org%3E" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-436177.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-436177.pdf" }, { "name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", "refsource": "MISC", "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "name": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html", "refsource": "MISC", "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html" }, { "name": "https://security.netapp.com/advisory/ntap-20190719-0004/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20190719-0004/" }, { "name": "https://support.f5.com/csp/article/K84141449", "refsource": "CONFIRM", "url": "https://support.f5.com/csp/article/K84141449" }, { "name": "https://support.f5.com/csp/article/K84141449?utm_source=f5support\u0026amp;utm_medium=RSS", "refsource": "CONFIRM", "url": "https://support.f5.com/csp/article/K84141449?utm_source=f5support\u0026amp;utm_medium=RSS" }, { "name": "RHSA-2019:3701", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:3701" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2019-3822", "datePublished": "2019-02-06T20:00:00", "dateReserved": "2019-01-03T00:00:00", "dateUpdated": "2024-08-04T19:19:18.599Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-8622 (GCVE-0-2016-8622)
Vulnerability from cvelistv5
Published
2018-07-31 21:00
Modified
2024-08-06 02:27
Severity ?
VLAI Severity ?
EPSS score ?
Summary
The URL percent-encoding decode function in libcurl before 7.51.0 is called `curl_easy_unescape`. Internally, even if this function would be made to allocate a unscape destination buffer larger than 2GB, it would return that new length in a signed 32 bit integer variable, thus the length would get either just truncated or both truncated and turned negative. That could then lead to libcurl writing outside of its heap based buffer.
References
► | URL | Tags | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
The Curl Project | curl |
Version: 7.51.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T02:27:40.993Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2018:3558", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:3558" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://curl.haxx.se/docs/adv_20161102H.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.tenable.com/security/tns-2016-21" }, { "name": "1037192", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1037192" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "name": "94105", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/94105" }, { "name": "RHSA-2018:2486", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2486" }, { "name": "GLSA-201701-47", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201701-47" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8622" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "curl", "vendor": "The Curl Project", "versions": [ { "status": "affected", "version": "7.51.0" } ] } ], "datePublic": "2016-11-02T00:00:00", "descriptions": [ { "lang": "en", "value": "The URL percent-encoding decode function in libcurl before 7.51.0 is called `curl_easy_unescape`. Internally, even if this function would be made to allocate a unscape destination buffer larger than 2GB, it would return that new length in a signed 32 bit integer variable, thus the length would get either just truncated or both truncated and turned negative. That could then lead to libcurl writing outside of its heap based buffer." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-190", "description": "CWE-190", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-122", "description": "CWE-122", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-11-13T10:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "RHSA-2018:3558", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:3558" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://curl.haxx.se/docs/adv_20161102H.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.tenable.com/security/tns-2016-21" }, { "name": "1037192", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1037192" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "name": "94105", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/94105" }, { "name": "RHSA-2018:2486", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2486" }, { "name": "GLSA-201701-47", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201701-47" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8622" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-8622", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "curl", "version": { "version_data": [ { "version_value": "7.51.0" } ] } } ] }, "vendor_name": "The Curl Project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The URL percent-encoding decode function in libcurl before 7.51.0 is called `curl_easy_unescape`. Internally, even if this function would be made to allocate a unscape destination buffer larger than 2GB, it would return that new length in a signed 32 bit integer variable, thus the length would get either just truncated or both truncated and turned negative. That could then lead to libcurl writing outside of its heap based buffer." } ] }, "impact": { "cvss": [ [ { "vectorString": "3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" } ], [ { "vectorString": "2.6/AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" } ] ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-190" } ] }, { "description": [ { "lang": "eng", "value": "CWE-122" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2018:3558", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:3558" }, { "name": "https://curl.haxx.se/docs/adv_20161102H.html", "refsource": "CONFIRM", "url": "https://curl.haxx.se/docs/adv_20161102H.html" }, { "name": "https://www.tenable.com/security/tns-2016-21", "refsource": "CONFIRM", "url": "https://www.tenable.com/security/tns-2016-21" }, { "name": "1037192", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1037192" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "name": "94105", "refsource": "BID", "url": "http://www.securityfocus.com/bid/94105" }, { "name": "RHSA-2018:2486", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2486" }, { "name": "GLSA-201701-47", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201701-47" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8622", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8622" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2016-8622", "datePublished": "2018-07-31T21:00:00", "dateReserved": "2016-10-12T00:00:00", "dateUpdated": "2024-08-06T02:27:40.993Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-6197 (GCVE-0-2024-6197)
Vulnerability from cvelistv5
Published
2024-07-24 07:29
Modified
2025-02-13 17:54
Severity ?
VLAI Severity ?
EPSS score ?
Summary
libcurl's ASN1 parser has this utf8asn1str() function used for parsing an ASN.1 UTF-8 string. Itcan detect an invalid field and return error. Unfortunately, when doing so it also invokes `free()` on a 4 byte localstack buffer. Most modern malloc implementations detect this error and immediately abort. Some however accept the input pointer and add that memory to its list of available chunks. This leads to the overwriting of nearby stack memory. The content of the overwrite is decided by the `free()` implementation; likely to be memory pointers and a set of flags. The most likely outcome of exploting this flaw is a crash, although it cannot be ruled out that more serious results can be had in special circumstances.
References
Impacted products
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:curl:curl:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "curl", "vendor": "curl", "versions": [ { "lessThanOrEqual": "8.8.0", "status": "affected", "version": "8.6.0", "versionType": "custom" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-6197", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-24T18:42:30.556099Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-24T18:44:18.885Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-11-29T12:04:44.300Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "json", "tags": [ "x_transferred" ], "url": "https://curl.se/docs/CVE-2024-6197.json" }, { "name": "www", "tags": [ "x_transferred" ], "url": "https://curl.se/docs/CVE-2024-6197.html" }, { "name": "issue", "tags": [ "x_transferred" ], "url": "https://hackerone.com/reports/2559516" }, { "tags": [ "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2024/07/24/1" }, { "tags": [ "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2024/07/24/5" }, { "url": "https://security.netapp.com/advisory/ntap-20241129-0008/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "curl", "vendor": "curl", "versions": [ { "lessThanOrEqual": "8.8.0", "status": "affected", "version": "8.8.0", "versionType": "semver" }, { "lessThanOrEqual": "8.7.1", "status": "affected", "version": "8.7.1", "versionType": "semver" }, { "lessThanOrEqual": "8.7.0", "status": "affected", "version": "8.7.0", "versionType": "semver" }, { "lessThanOrEqual": "8.6.0", "status": "affected", "version": "8.6.0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "z2_" }, { "lang": "en", "type": "remediation developer", "value": "z2_" } ], "descriptions": [ { "lang": "en", "value": "libcurl\u0027s ASN1 parser has this utf8asn1str() function used for parsing an ASN.1 UTF-8 string. Itcan detect an invalid field and return error. Unfortunately, when doing so it also invokes `free()` on a 4 byte localstack buffer. Most modern malloc implementations detect this error and immediately abort. Some however accept the input pointer and add that memory to its list of available chunks. This leads to the overwriting of nearby stack memory. The content of the overwrite is decided by the `free()` implementation; likely to be memory pointers and a set of flags. The most likely outcome of exploting this flaw is a crash, although it cannot be ruled out that more serious results can be had in special circumstances." } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-590 Free of Memory not on the Heap", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-24T21:06:02.872Z", "orgId": "2499f714-1537-4658-8207-48ae4bb9eae9", "shortName": "curl" }, "references": [ { "name": "json", "url": "https://curl.se/docs/CVE-2024-6197.json" }, { "name": "www", "url": "https://curl.se/docs/CVE-2024-6197.html" }, { "name": "issue", "url": "https://hackerone.com/reports/2559516" }, { "url": "http://www.openwall.com/lists/oss-security/2024/07/24/1" }, { "url": "http://www.openwall.com/lists/oss-security/2024/07/24/5" } ], "title": "freeing stack buffer in utf8asn1str" } }, "cveMetadata": { "assignerOrgId": "2499f714-1537-4658-8207-48ae4bb9eae9", "assignerShortName": "curl", "cveId": "CVE-2024-6197", "datePublished": "2024-07-24T07:29:50.003Z", "dateReserved": "2024-06-20T07:20:43.202Z", "dateUpdated": "2025-02-13T17:54:41.039Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-2174 (GCVE-0-2013-2174)
Vulnerability from cvelistv5
Published
2013-07-31 10:00
Modified
2024-08-06 15:27
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Heap-based buffer overflow in the curl_easy_unescape function in lib/escape.c in cURL and libcurl 7.7 through 7.30.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted string ending in a "%" (percent) character.
References
► | URL | Tags | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T15:27:41.030Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "name": "openSUSE-SU-2013:1133", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-07/msg00013.html" }, { "name": "RHSA-2013:0983", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0983.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/bagder/curl/commit/192c4f788d48f82c03e9cef40013f34370e90737" }, { "name": "60737", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/60737" }, { "name": "USN-1894-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1894-1" }, { "name": "DSA-2713", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2013/dsa-2713" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://curl.haxx.se/docs/adv_20130622.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-05-19T00:00:00", "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in the curl_easy_unescape function in lib/escape.c in cURL and libcurl 7.7 through 7.30.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted string ending in a \"%\" (percent) character." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-11-25T19:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "name": "openSUSE-SU-2013:1133", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-07/msg00013.html" }, { "name": "RHSA-2013:0983", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0983.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/bagder/curl/commit/192c4f788d48f82c03e9cef40013f34370e90737" }, { "name": "60737", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/60737" }, { "name": "USN-1894-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1894-1" }, { "name": "DSA-2713", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2013/dsa-2713" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://curl.haxx.se/docs/adv_20130622.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-2174", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap-based buffer overflow in the curl_easy_unescape function in lib/escape.c in cURL and libcurl 7.7 through 7.30.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted string ending in a \"%\" (percent) character." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "name": "openSUSE-SU-2013:1133", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-07/msg00013.html" }, { "name": "RHSA-2013:0983", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2013-0983.html" }, { "name": "https://github.com/bagder/curl/commit/192c4f788d48f82c03e9cef40013f34370e90737", "refsource": "CONFIRM", "url": "https://github.com/bagder/curl/commit/192c4f788d48f82c03e9cef40013f34370e90737" }, { "name": "60737", "refsource": "BID", "url": "http://www.securityfocus.com/bid/60737" }, { "name": "USN-1894-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1894-1" }, { "name": "DSA-2713", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2013/dsa-2713" }, { "name": "http://curl.haxx.se/docs/adv_20130622.html", "refsource": "CONFIRM", "url": "http://curl.haxx.se/docs/adv_20130622.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-2174", "datePublished": "2013-07-31T10:00:00", "dateReserved": "2013-02-19T00:00:00", "dateUpdated": "2024-08-06T15:27:41.030Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-8816 (GCVE-0-2017-8816)
Vulnerability from cvelistv5
Published
2017-11-29 18:00
Modified
2024-08-05 16:48
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- integer overflow
Summary
The NTLM authentication feature in curl and libcurl before 7.57.0 on 32-bit platforms allows attackers to cause a denial of service (integer overflow and resultant buffer overflow, and application crash) or possibly have unspecified other impact via vectors involving long user and password fields.
References
► | URL | Tags | ||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | curl and libcurl before 7.57.0 |
Version: curl and libcurl before 7.57.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T16:48:21.978Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://security.cucumberlinux.com/security/details.php?id=161" }, { "name": "GLSA-201712-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201712-04" }, { "name": "RHSA-2018:3558", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:3558" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://curl.haxx.se/docs/adv_2017-12e7.html" }, { "name": "101998", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/101998" }, { "name": "1039896", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1039896" }, { "name": "DSA-4051", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2017/dsa-4051" }, { "name": "1040608", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1040608" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "curl and libcurl before 7.57.0", "vendor": "n/a", "versions": [ { "status": "affected", "version": "curl and libcurl before 7.57.0" } ] } ], "datePublic": "2017-11-29T00:00:00", "descriptions": [ { "lang": "en", "value": "The NTLM authentication feature in curl and libcurl before 7.57.0 on 32-bit platforms allows attackers to cause a denial of service (integer overflow and resultant buffer overflow, and application crash) or possibly have unspecified other impact via vectors involving long user and password fields." } ], "problemTypes": [ { "descriptions": [ { "description": "integer overflow", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-11-13T10:57:01", "orgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "shortName": "debian" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://security.cucumberlinux.com/security/details.php?id=161" }, { "name": "GLSA-201712-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201712-04" }, { "name": "RHSA-2018:3558", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:3558" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://curl.haxx.se/docs/adv_2017-12e7.html" }, { "name": "101998", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/101998" }, { "name": "1039896", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1039896" }, { "name": "DSA-4051", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2017/dsa-4051" }, { "name": "1040608", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1040608" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@debian.org", "ID": "CVE-2017-8816", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "curl and libcurl before 7.57.0", "version": { "version_data": [ { "version_value": "curl and libcurl before 7.57.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The NTLM authentication feature in curl and libcurl before 7.57.0 on 32-bit platforms allows attackers to cause a denial of service (integer overflow and resultant buffer overflow, and application crash) or possibly have unspecified other impact via vectors involving long user and password fields." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "integer overflow" } ] } ] }, "references": { "reference_data": [ { "name": "http://security.cucumberlinux.com/security/details.php?id=161", "refsource": "CONFIRM", "url": "http://security.cucumberlinux.com/security/details.php?id=161" }, { "name": "GLSA-201712-04", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201712-04" }, { "name": "RHSA-2018:3558", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:3558" }, { "name": "https://curl.haxx.se/docs/adv_2017-12e7.html", "refsource": "CONFIRM", "url": "https://curl.haxx.se/docs/adv_2017-12e7.html" }, { "name": "101998", "refsource": "BID", "url": "http://www.securityfocus.com/bid/101998" }, { "name": "1039896", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1039896" }, { "name": "DSA-4051", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2017/dsa-4051" }, { "name": "1040608", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1040608" } ] } } } }, "cveMetadata": { "assignerOrgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "assignerShortName": "debian", "cveId": "CVE-2017-8816", "datePublished": "2017-11-29T18:00:00", "dateReserved": "2017-05-07T00:00:00", "dateUpdated": "2024-08-05T16:48:21.978Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2015-3236 (GCVE-0-2015-3236)
Vulnerability from cvelistv5
Published
2015-06-22 19:00
Modified
2024-08-06 05:39
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
cURL and libcurl 7.40.0 through 7.42.1 send the HTTP Basic authentication credentials for a previous connection when reusing a reset (curl_easy_reset) connection handle to send a request to the same host name, which allows remote attackers to obtain sensitive information via unspecified vectors.
References
► | URL | Tags | ||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T05:39:32.230Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10131" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://curl.haxx.se/docs/adv_20150617A.html" }, { "name": "FEDORA-2015-10155", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160660.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html" }, { "name": "75385", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/75385" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "name": "91787", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/91787" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html" }, { "name": "GLSA-201509-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201509-02" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-06-17T00:00:00", "descriptions": [ { "lang": "en", "value": "cURL and libcurl 7.40.0 through 7.42.1 send the HTTP Basic authentication credentials for a previous connection when reusing a reset (curl_easy_reset) connection handle to send a request to the same host name, which allows remote attackers to obtain sensitive information via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-17T00:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10131" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://curl.haxx.se/docs/adv_20150617A.html" }, { "name": "FEDORA-2015-10155", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160660.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html" }, { "name": "75385", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/75385" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "name": "91787", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/91787" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html" }, { "name": "GLSA-201509-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201509-02" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2015-3236", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "cURL and libcurl 7.40.0 through 7.42.1 send the HTTP Basic authentication credentials for a previous connection when reusing a reset (curl_easy_reset) connection handle to send a request to the same host name, which allows remote attackers to obtain sensitive information via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10131", "refsource": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10131" }, { "name": "http://curl.haxx.se/docs/adv_20150617A.html", "refsource": "CONFIRM", "url": "http://curl.haxx.se/docs/adv_20150617A.html" }, { "name": "FEDORA-2015-10155", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160660.html" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html" }, { "name": "75385", "refsource": "BID", "url": "http://www.securityfocus.com/bid/75385" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "name": "91787", "refsource": "BID", "url": "http://www.securityfocus.com/bid/91787" }, { "name": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html" }, { "name": "GLSA-201509-02", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201509-02" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2015-3236", "datePublished": "2015-06-22T19:00:00", "dateReserved": "2015-04-10T00:00:00", "dateUpdated": "2024-08-06T05:39:32.230Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2015-3145 (GCVE-0-2015-3145)
Vulnerability from cvelistv5
Published
2015-04-24 14:00
Modified
2024-08-06 05:39
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The sanitize_cookie_path function in cURL and libcurl 7.31.0 through 7.41.0 does not properly calculate an index, which allows remote attackers to cause a denial of service (out-of-bounds write and crash) or possibly have other unspecified impact via a cookie path containing only a double-quote character.
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T05:39:30.959Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "74303", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/74303" }, { "name": "FEDORA-2015-6853", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157188.html" }, { "name": "DSA-3232", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2015/dsa-3232" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://curl.haxx.se/docs/adv_20150422C.html" }, { "name": "FEDORA-2015-6712", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156250.html" }, { "name": "MDVSA-2015:219", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:219" }, { "name": "USN-2591-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2591-1" }, { "name": "1032232", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1032232" }, { "name": "APPLE-SA-2015-08-13-2", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10743" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html" }, { "name": "openSUSE-SU-2015:0799", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00057.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://advisories.mageia.org/MGASA-2015-0179.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT205031" }, { "name": "GLSA-201509-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201509-02" }, { "name": "FEDORA-2015-6728", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157017.html" }, { "name": "FEDORA-2015-6695", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155957.html" }, { "name": "FEDORA-2015-6864", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156945.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-04-22T00:00:00", "descriptions": [ { "lang": "en", "value": "The sanitize_cookie_path function in cURL and libcurl 7.31.0 through 7.41.0 does not properly calculate an index, which allows remote attackers to cause a denial of service (out-of-bounds write and crash) or possibly have other unspecified impact via a cookie path containing only a double-quote character." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-17T00:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "74303", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/74303" }, { "name": "FEDORA-2015-6853", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157188.html" }, { "name": "DSA-3232", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2015/dsa-3232" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://curl.haxx.se/docs/adv_20150422C.html" }, { "name": "FEDORA-2015-6712", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156250.html" }, { "name": "MDVSA-2015:219", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:219" }, { "name": "USN-2591-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2591-1" }, { "name": "1032232", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1032232" }, { "name": "APPLE-SA-2015-08-13-2", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10743" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html" }, { "name": "openSUSE-SU-2015:0799", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00057.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://advisories.mageia.org/MGASA-2015-0179.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT205031" }, { "name": "GLSA-201509-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201509-02" }, { "name": "FEDORA-2015-6728", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157017.html" }, { "name": "FEDORA-2015-6695", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155957.html" }, { "name": "FEDORA-2015-6864", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156945.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2015-3145", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The sanitize_cookie_path function in cURL and libcurl 7.31.0 through 7.41.0 does not properly calculate an index, which allows remote attackers to cause a denial of service (out-of-bounds write and crash) or possibly have other unspecified impact via a cookie path containing only a double-quote character." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "74303", "refsource": "BID", "url": "http://www.securityfocus.com/bid/74303" }, { "name": "FEDORA-2015-6853", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157188.html" }, { "name": "DSA-3232", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2015/dsa-3232" }, { "name": "http://curl.haxx.se/docs/adv_20150422C.html", "refsource": "CONFIRM", "url": "http://curl.haxx.se/docs/adv_20150422C.html" }, { "name": "FEDORA-2015-6712", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156250.html" }, { "name": "MDVSA-2015:219", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:219" }, { "name": "USN-2591-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2591-1" }, { "name": "1032232", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1032232" }, { "name": "APPLE-SA-2015-08-13-2", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10743", "refsource": "CONFIRM", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10743" }, { "name": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html" }, { "name": "openSUSE-SU-2015:0799", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00057.html" }, { "name": "http://advisories.mageia.org/MGASA-2015-0179.html", "refsource": "CONFIRM", "url": "http://advisories.mageia.org/MGASA-2015-0179.html" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763" }, { "name": "https://support.apple.com/kb/HT205031", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT205031" }, { "name": "GLSA-201509-02", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201509-02" }, { "name": "FEDORA-2015-6728", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157017.html" }, { "name": "FEDORA-2015-6695", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155957.html" }, { "name": "FEDORA-2015-6864", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156945.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2015-3145", "datePublished": "2015-04-24T14:00:00", "dateReserved": "2015-04-10T00:00:00", "dateUpdated": "2024-08-06T05:39:30.959Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-7468 (GCVE-0-2017-7468)
Vulnerability from cvelistv5
Published
2018-07-16 13:00
Modified
2024-08-05 16:04
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
In curl and libcurl 7.52.0 to and including 7.53.1, libcurl would attempt to resume a TLS session even if the client certificate had changed. That is unacceptable since a server by specification is allowed to skip the client certificate check on resume, and may instead use the old identity which was established by the previous certificate (or no certificate). libcurl supports by default the use of TLS session id/ticket to resume previous TLS sessions to speed up subsequent TLS handshakes. They are used when for any reason an existing TLS connection couldn't be kept alive to make the next handshake faster. This flaw is a regression and identical to CVE-2016-5419 reported on August 3rd 2016, but affecting a different version range.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T16:04:11.554Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7468" }, { "name": "GLSA-201709-14", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201709-14" }, { "name": "1038341", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1038341" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://curl.haxx.se/docs/adv_20170419.html" }, { "name": "97962", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/97962" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "curl", "vendor": "[UNKNOWN]", "versions": [ { "status": "affected", "version": "curl 7.54.0" } ] } ], "datePublic": "2017-04-19T00:00:00", "descriptions": [ { "lang": "en", "value": "In curl and libcurl 7.52.0 to and including 7.53.1, libcurl would attempt to resume a TLS session even if the client certificate had changed. That is unacceptable since a server by specification is allowed to skip the client certificate check on resume, and may instead use the old identity which was established by the previous certificate (or no certificate). libcurl supports by default the use of TLS session id/ticket to resume previous TLS sessions to speed up subsequent TLS handshakes. They are used when for any reason an existing TLS connection couldn\u0027t be kept alive to make the next handshake faster. This flaw is a regression and identical to CVE-2016-5419 reported on August 3rd 2016, but affecting a different version range." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-295", "description": "CWE-295", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-07-17T09:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7468" }, { "name": "GLSA-201709-14", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201709-14" }, { "name": "1038341", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1038341" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://curl.haxx.se/docs/adv_20170419.html" }, { "name": "97962", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/97962" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2017-7468", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "curl", "version": { "version_data": [ { "version_value": "curl 7.54.0" } ] } } ] }, "vendor_name": "[UNKNOWN]" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In curl and libcurl 7.52.0 to and including 7.53.1, libcurl would attempt to resume a TLS session even if the client certificate had changed. That is unacceptable since a server by specification is allowed to skip the client certificate check on resume, and may instead use the old identity which was established by the previous certificate (or no certificate). libcurl supports by default the use of TLS session id/ticket to resume previous TLS sessions to speed up subsequent TLS handshakes. They are used when for any reason an existing TLS connection couldn\u0027t be kept alive to make the next handshake faster. This flaw is a regression and identical to CVE-2016-5419 reported on August 3rd 2016, but affecting a different version range." } ] }, "impact": { "cvss": [ [ { "vectorString": "4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" } ] ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-295" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7468", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7468" }, { "name": "GLSA-201709-14", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201709-14" }, { "name": "1038341", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1038341" }, { "name": "https://curl.haxx.se/docs/adv_20170419.html", "refsource": "CONFIRM", "url": "https://curl.haxx.se/docs/adv_20170419.html" }, { "name": "97962", "refsource": "BID", "url": "http://www.securityfocus.com/bid/97962" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2017-7468", "datePublished": "2018-07-16T13:00:00", "dateReserved": "2017-04-05T00:00:00", "dateUpdated": "2024-08-05T16:04:11.554Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-27537 (GCVE-0-2023-27537)
Vulnerability from cvelistv5
Published
2023-03-30 00:00
Modified
2024-08-02 12:16
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-415 - Double Free ()
Summary
A double free vulnerability exists in libcurl <8.0.0 when sharing HSTS data between separate "handles". This sharing was introduced without considerations for do this sharing across separate threads but there was no indication of this fact in the documentation. Due to missing mutexes or thread locks, two threads sharing the same HSTS data could end up doing a double-free or use-after-free.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | https://github.com/curl/curl |
Version: Fixed in 8.0.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T12:16:35.551Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://hackerone.com/reports/1897203" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20230420-0010/" }, { "name": "GLSA-202310-12", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202310-12" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "https://github.com/curl/curl", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Fixed in 8.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A double free vulnerability exists in libcurl \u003c8.0.0 when sharing HSTS data between separate \"handles\". This sharing was introduced without considerations for do this sharing across separate threads but there was no indication of this fact in the documentation. Due to missing mutexes or thread locks, two threads sharing the same HSTS data could end up doing a double-free or use-after-free." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-415", "description": "Double Free (CWE-415)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-11T10:06:37.578536", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "url": "https://hackerone.com/reports/1897203" }, { "url": "https://security.netapp.com/advisory/ntap-20230420-0010/" }, { "name": "GLSA-202310-12", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202310-12" } ] } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2023-27537", "datePublished": "2023-03-30T00:00:00", "dateReserved": "2023-03-02T00:00:00", "dateUpdated": "2024-08-02T12:16:35.551Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2014-3707 (GCVE-0-2014-3707)
Vulnerability from cvelistv5
Published
2014-11-15 20:00
Modified
2024-08-06 10:50
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The curl_easy_duphandle function in libcurl 7.17.1 through 7.38.0, when running with the CURLOPT_COPYPOSTFIELDS option, does not properly copy HTTP POST data for an easy handle, which triggers an out-of-bounds read that allows remote web servers to read sensitive memory information.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:50:17.972Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "name": "DSA-3069", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2014/dsa-3069" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html" }, { "name": "USN-2399-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2399-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "name": "APPLE-SA-2015-08-13-2", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html" }, { "name": "RHSA-2015:1254", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1254.html" }, { "name": "70988", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/70988" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10743" }, { "name": "openSUSE-SU-2015:0248", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00040.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT205031" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://curl.haxx.se/docs/adv_20141105.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-11-05T00:00:00", "descriptions": [ { "lang": "en", "value": "The curl_easy_duphandle function in libcurl 7.17.1 through 7.38.0, when running with the CURLOPT_COPYPOSTFIELDS option, does not properly copy HTTP POST data for an easy handle, which triggers an out-of-bounds read that allows remote web servers to read sensitive memory information." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-04T19:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "name": "DSA-3069", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2014/dsa-3069" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html" }, { "name": "USN-2399-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2399-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "name": "APPLE-SA-2015-08-13-2", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html" }, { "name": "RHSA-2015:1254", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1254.html" }, { "name": "70988", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/70988" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10743" }, { "name": "openSUSE-SU-2015:0248", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00040.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT205031" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://curl.haxx.se/docs/adv_20141105.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-3707", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The curl_easy_duphandle function in libcurl 7.17.1 through 7.38.0, when running with the CURLOPT_COPYPOSTFIELDS option, does not properly copy HTTP POST data for an easy handle, which triggers an out-of-bounds read that allows remote web servers to read sensitive memory information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "name": "DSA-3069", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2014/dsa-3069" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html" }, { "name": "USN-2399-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2399-1" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "name": "APPLE-SA-2015-08-13-2", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html" }, { "name": "RHSA-2015:1254", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2015-1254.html" }, { "name": "70988", "refsource": "BID", "url": "http://www.securityfocus.com/bid/70988" }, { "name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10743", "refsource": "CONFIRM", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10743" }, { "name": "openSUSE-SU-2015:0248", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00040.html" }, { "name": "https://support.apple.com/kb/HT205031", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT205031" }, { "name": "http://curl.haxx.se/docs/adv_20141105.html", "refsource": "CONFIRM", "url": "http://curl.haxx.se/docs/adv_20141105.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2014-3707", "datePublished": "2014-11-15T20:00:00", "dateReserved": "2014-05-14T00:00:00", "dateUpdated": "2024-08-06T10:50:17.972Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-22945 (GCVE-0-2021-22945)
Vulnerability from cvelistv5
Published
2021-09-23 00:00
Modified
2025-06-09 14:47
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-415 - Double Free ()
Summary
When sending data to an MQTT server, libcurl <= 7.73.0 and 7.78.0 could in some circumstances erroneously keep a pointer to an already freed memory area and both use that again in a subsequent call to send data and also free it *again*.
References
► | URL | Tags | ||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | https://github.com/curl/curl |
Version: curl 7.73.0 to and including 7.78.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:58:26.137Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://hackerone.com/reports/1269242" }, { "name": "FEDORA-2021-fc96a3a749", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/" }, { "tags": [ "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20211029-0003/" }, { "name": "FEDORA-2021-1d24845e93", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "tags": [ "x_transferred" ], "url": "https://support.apple.com/kb/HT213183" }, { "name": "20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3", "tags": [ "mailing-list", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2022/Mar/29" }, { "name": "DSA-5197", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2022/dsa-5197" }, { "name": "GLSA-202212-01", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202212-01" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2021-22945", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-03-28T15:53:40.610696Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-415", "description": "CWE-415 Double Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-09T14:47:23.444Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "https://github.com/curl/curl", "vendor": "n/a", "versions": [ { "status": "affected", "version": "curl 7.73.0 to and including 7.78.0" } ] } ], "descriptions": [ { "lang": "en", "value": "When sending data to an MQTT server, libcurl \u003c= 7.73.0 and 7.78.0 could in some circumstances erroneously keep a pointer to an already freed memory area and both use that again in a subsequent call to send data and also free it *again*." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-415", "description": "Double Free (CWE-415)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-19T00:00:00.000Z", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "url": "https://hackerone.com/reports/1269242" }, { "name": "FEDORA-2021-fc96a3a749", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/" }, { "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "url": "https://security.netapp.com/advisory/ntap-20211029-0003/" }, { "name": "FEDORA-2021-1d24845e93", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/" }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "url": "https://support.apple.com/kb/HT213183" }, { "name": "20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3", "tags": [ "mailing-list" ], "url": "http://seclists.org/fulldisclosure/2022/Mar/29" }, { "name": "DSA-5197", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2022/dsa-5197" }, { "name": "GLSA-202212-01", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202212-01" } ] } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2021-22945", "datePublished": "2021-09-23T00:00:00.000Z", "dateReserved": "2021-01-06T00:00:00.000Z", "dateUpdated": "2025-06-09T14:47:23.444Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2014-3620 (GCVE-0-2014-3620)
Vulnerability from cvelistv5
Published
2014-11-18 15:00
Modified
2024-08-06 10:50
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
cURL and libcurl before 7.38.0 allow remote attackers to bypass the Same Origin Policy and set cookies for arbitrary sites by setting a cookie for a top-level domain.
References
► | URL | Tags | ||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:50:17.909Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "69742", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/69742" }, { "name": "APPLE-SA-2015-08-13-2", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://curl.haxx.se/docs/adv_20140910B.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10743" }, { "name": "openSUSE-SU-2014:1139", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00024.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT205031" }, { "name": "DSA-3022", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2014/dsa-3022" }, { "name": "[oss-security] 20220511 [SECURITY ADVISORY] curl: cookie for trailing dot TLD", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/05/11/2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-09-10T00:00:00", "descriptions": [ { "lang": "en", "value": "cURL and libcurl before 7.38.0 allow remote attackers to bypass the Same Origin Policy and set cookies for arbitrary sites by setting a cookie for a top-level domain." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T08:06:09", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "69742", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/69742" }, { "name": "APPLE-SA-2015-08-13-2", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://curl.haxx.se/docs/adv_20140910B.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10743" }, { "name": "openSUSE-SU-2014:1139", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00024.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT205031" }, { "name": "DSA-3022", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2014/dsa-3022" }, { "name": "[oss-security] 20220511 [SECURITY ADVISORY] curl: cookie for trailing dot TLD", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2022/05/11/2" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-3620", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "cURL and libcurl before 7.38.0 allow remote attackers to bypass the Same Origin Policy and set cookies for arbitrary sites by setting a cookie for a top-level domain." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "69742", "refsource": "BID", "url": "http://www.securityfocus.com/bid/69742" }, { "name": "APPLE-SA-2015-08-13-2", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html" }, { "name": "http://curl.haxx.se/docs/adv_20140910B.html", "refsource": "CONFIRM", "url": "http://curl.haxx.se/docs/adv_20140910B.html" }, { "name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10743", "refsource": "CONFIRM", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10743" }, { "name": "openSUSE-SU-2014:1139", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00024.html" }, { "name": "https://support.apple.com/kb/HT205031", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT205031" }, { "name": "DSA-3022", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2014/dsa-3022" }, { "name": "[oss-security] 20220511 [SECURITY ADVISORY] curl: cookie for trailing dot TLD", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2022/05/11/2" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2014-3620", "datePublished": "2014-11-18T15:00:00", "dateReserved": "2014-05-14T00:00:00", "dateUpdated": "2024-08-06T10:50:17.909Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2005-0490 (GCVE-0-2005-0490)
Vulnerability from cvelistv5
Published
2005-02-21 05:00
Modified
2024-08-07 21:13
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple stack-based buffer overflows in libcURL and cURL 7.12.1, and possibly other versions, allow remote malicious web servers to execute arbitrary code via base64 encoded replies that exceed the intended buffer lengths when decoded, which is not properly handled by (1) the Curl_input_ntlm function in http_ntlm.c during NTLM authentication or (2) the Curl_krb_kauth and krb4_auth functions in krb4.c during Kerberos authentication.
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T21:13:54.367Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20050228 [USN-86-1] cURL vulnerability", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://marc.info/?l=full-disclosure\u0026m=110959085507755\u0026w=2" }, { "name": "CLA-2005:940", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA", "x_transferred" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000940" }, { "name": "20050221 Multiple Unix/Linux Vendor cURL/libcURL NTLM Authentication Buffer Overflow Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE", "x_transferred" ], "url": "http://www.idefense.com/application/poi/display?id=202\u0026type=vulnerabilities" }, { "name": "oval:org.mitre.oval:def:10273", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10273" }, { "name": "12616", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/12616" }, { "name": "12615", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/12615" }, { "name": "curl-kerberos-bo(19423)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19423" }, { "name": "20050221 Multiple Unix/Linux Vendor cURL/libcURL Kerberos Authentication Buffer Overflow Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE", "x_transferred" ], "url": "http://www.idefense.com/application/poi/display?id=203\u0026type=vulnerabilities" }, { "name": "MDKSA-2005:048", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:048" }, { "name": "GLSA-200503-20", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200503-20.xml" }, { "name": "RHSA-2005:340", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-340.html" }, { "name": "SUSE-SA:2005:011", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2005_11_curl.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-02-21T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple stack-based buffer overflows in libcURL and cURL 7.12.1, and possibly other versions, allow remote malicious web servers to execute arbitrary code via base64 encoded replies that exceed the intended buffer lengths when decoded, which is not properly handled by (1) the Curl_input_ntlm function in http_ntlm.c during NTLM authentication or (2) the Curl_krb_kauth and krb4_auth functions in krb4.c during Kerberos authentication." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T00:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20050228 [USN-86-1] cURL vulnerability", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://marc.info/?l=full-disclosure\u0026m=110959085507755\u0026w=2" }, { "name": "CLA-2005:940", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000940" }, { "name": "20050221 Multiple Unix/Linux Vendor cURL/libcURL NTLM Authentication Buffer Overflow Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE" ], "url": "http://www.idefense.com/application/poi/display?id=202\u0026type=vulnerabilities" }, { "name": "oval:org.mitre.oval:def:10273", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10273" }, { "name": "12616", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/12616" }, { "name": "12615", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/12615" }, { "name": "curl-kerberos-bo(19423)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19423" }, { "name": "20050221 Multiple Unix/Linux Vendor cURL/libcURL Kerberos Authentication Buffer Overflow Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE" ], "url": "http://www.idefense.com/application/poi/display?id=203\u0026type=vulnerabilities" }, { "name": "MDKSA-2005:048", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:048" }, { "name": "GLSA-200503-20", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200503-20.xml" }, { "name": "RHSA-2005:340", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-340.html" }, { "name": "SUSE-SA:2005:011", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2005_11_curl.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-0490", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple stack-based buffer overflows in libcURL and cURL 7.12.1, and possibly other versions, allow remote malicious web servers to execute arbitrary code via base64 encoded replies that exceed the intended buffer lengths when decoded, which is not properly handled by (1) the Curl_input_ntlm function in http_ntlm.c during NTLM authentication or (2) the Curl_krb_kauth and krb4_auth functions in krb4.c during Kerberos authentication." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20050228 [USN-86-1] cURL vulnerability", "refsource": "FULLDISC", "url": "http://marc.info/?l=full-disclosure\u0026m=110959085507755\u0026w=2" }, { "name": "CLA-2005:940", "refsource": "CONECTIVA", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000940" }, { "name": "20050221 Multiple Unix/Linux Vendor cURL/libcURL NTLM Authentication Buffer Overflow Vulnerability", "refsource": "IDEFENSE", "url": "http://www.idefense.com/application/poi/display?id=202\u0026type=vulnerabilities" }, { "name": "oval:org.mitre.oval:def:10273", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10273" }, { "name": "12616", "refsource": "BID", "url": "http://www.securityfocus.com/bid/12616" }, { "name": "12615", "refsource": "BID", "url": "http://www.securityfocus.com/bid/12615" }, { "name": "curl-kerberos-bo(19423)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19423" }, { "name": "20050221 Multiple Unix/Linux Vendor cURL/libcURL Kerberos Authentication Buffer Overflow Vulnerability", "refsource": "IDEFENSE", "url": "http://www.idefense.com/application/poi/display?id=203\u0026type=vulnerabilities" }, { "name": "MDKSA-2005:048", "refsource": "MANDRAKE", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:048" }, { "name": "GLSA-200503-20", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-200503-20.xml" }, { "name": "RHSA-2005:340", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2005-340.html" }, { "name": "SUSE-SA:2005:011", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2005_11_curl.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-0490", "datePublished": "2005-02-21T05:00:00", "dateReserved": "2005-02-21T00:00:00", "dateUpdated": "2024-08-07T21:13:54.367Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2015-3153 (GCVE-0-2015-3153)
Vulnerability from cvelistv5
Published
2015-05-01 15:00
Modified
2024-08-06 05:39
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The default configuration for cURL and libcurl before 7.42.1 sends custom HTTP headers to both the proxy and destination server, which might allow remote proxy servers to obtain sensitive information by reading the header contents.
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T05:39:31.633Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10131" }, { "name": "1032233", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1032233" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html" }, { "name": "USN-2591-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2591-1" }, { "name": "openSUSE-SU-2015:0861", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-05/msg00017.html" }, { "name": "APPLE-SA-2015-08-13-2", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10743" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT205031" }, { "name": "74408", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/74408" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://curl.haxx.se/docs/adv_20150429.html" }, { "name": "DSA-3240", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2015/dsa-3240" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-04-29T00:00:00", "descriptions": [ { "lang": "en", "value": "The default configuration for cURL and libcurl before 7.42.1 sends custom HTTP headers to both the proxy and destination server, which might allow remote proxy servers to obtain sensitive information by reading the header contents." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-17T00:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10131" }, { "name": "1032233", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1032233" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html" }, { "name": "USN-2591-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2591-1" }, { "name": "openSUSE-SU-2015:0861", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-05/msg00017.html" }, { "name": "APPLE-SA-2015-08-13-2", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10743" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT205031" }, { "name": "74408", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/74408" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://curl.haxx.se/docs/adv_20150429.html" }, { "name": "DSA-3240", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2015/dsa-3240" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2015-3153", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The default configuration for cURL and libcurl before 7.42.1 sends custom HTTP headers to both the proxy and destination server, which might allow remote proxy servers to obtain sensitive information by reading the header contents." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10131", "refsource": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10131" }, { "name": "1032233", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1032233" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html" }, { "name": "USN-2591-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2591-1" }, { "name": "openSUSE-SU-2015:0861", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2015-05/msg00017.html" }, { "name": "APPLE-SA-2015-08-13-2", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10743", "refsource": "CONFIRM", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10743" }, { "name": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html" }, { "name": "https://support.apple.com/kb/HT205031", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT205031" }, { "name": "74408", "refsource": "BID", "url": "http://www.securityfocus.com/bid/74408" }, { "name": "http://curl.haxx.se/docs/adv_20150429.html", "refsource": "CONFIRM", "url": "http://curl.haxx.se/docs/adv_20150429.html" }, { "name": "DSA-3240", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2015/dsa-3240" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2015-3153", "datePublished": "2015-05-01T15:00:00", "dateReserved": "2015-04-10T00:00:00", "dateUpdated": "2024-08-06T05:39:31.633Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-1000099 (GCVE-0-2017-1000099)
Vulnerability from cvelistv5
Published
2017-10-04 01:00
Modified
2024-08-05 21:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
When asking to get a file from a file:// URL, libcurl provides a feature that outputs meta-data about the file using HTTP-like headers. The code doing this would send the wrong buffer to the user (stdout or the application's provide callback), which could lead to other private data from the heap to get inadvertently displayed. The wrong buffer was an uninitialized memory area allocated on the heap and if it turned out to not contain any zero byte, it would continue and display the data following that buffer in memory.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T21:53:06.676Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "100281", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/100281" }, { "name": "GLSA-201709-14", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201709-14" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://curl.haxx.se/0809C.patch" }, { "name": "1039119", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1039119" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "dateAssigned": "2017-08-22T00:00:00", "datePublic": "2017-10-03T00:00:00", "descriptions": [ { "lang": "en", "value": "When asking to get a file from a file:// URL, libcurl provides a feature that outputs meta-data about the file using HTTP-like headers. The code doing this would send the wrong buffer to the user (stdout or the application\u0027s provide callback), which could lead to other private data from the heap to get inadvertently displayed. The wrong buffer was an uninitialized memory area allocated on the heap and if it turned out to not contain any zero byte, it would continue and display the data following that buffer in memory." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-04T09:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "100281", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/100281" }, { "name": "GLSA-201709-14", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201709-14" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://curl.haxx.se/0809C.patch" }, { "name": "1039119", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1039119" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "DATE_ASSIGNED": "2017-08-22T17:29:33.315249", "ID": "CVE-2017-1000099", "REQUESTER": "daniel@haxx.se", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "When asking to get a file from a file:// URL, libcurl provides a feature that outputs meta-data about the file using HTTP-like headers. The code doing this would send the wrong buffer to the user (stdout or the application\u0027s provide callback), which could lead to other private data from the heap to get inadvertently displayed. The wrong buffer was an uninitialized memory area allocated on the heap and if it turned out to not contain any zero byte, it would continue and display the data following that buffer in memory." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "100281", "refsource": "BID", "url": "http://www.securityfocus.com/bid/100281" }, { "name": "GLSA-201709-14", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201709-14" }, { "name": "https://curl.haxx.se/0809C.patch", "refsource": "CONFIRM", "url": "https://curl.haxx.se/0809C.patch" }, { "name": "1039119", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1039119" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-1000099", "datePublished": "2017-10-04T01:00:00", "dateReserved": "2017-10-03T00:00:00", "dateUpdated": "2024-08-05T21:53:06.676Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-1000005 (GCVE-0-2018-1000005)
Vulnerability from cvelistv5
Published
2018-01-24 22:00
Modified
2024-08-05 12:33
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
libcurl 7.49.0 to and including 7.57.0 contains an out bounds read in code handling HTTP/2 trailers. It was reported (https://github.com/curl/curl/pull/2231) that reading an HTTP/2 trailer could mess up future trailers since the stored size was one byte less than required. The problem is that the code that creates HTTP/1-like headers from the HTTP/2 trailer data once appended a string like `:` to the target buffer, while this was recently changed to `: ` (a space was added after the colon) but the following math wasn't updated correspondingly. When accessed, the data is read out of bounds and causes either a crash or that the (too large) data gets passed to client write. This could lead to a denial-of-service situation or an information disclosure if someone has a service that echoes back or uses the trailers for something.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T12:33:49.200Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1040273", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1040273" }, { "name": "USN-3554-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3554-1/" }, { "name": "DSA-4098", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4098" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://curl.haxx.se/docs/adv_2018-824a.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/curl/curl/pull/2231" }, { "name": "RHSA-2019:1543", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:1543" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "dateAssigned": "2018-01-17T00:00:00", "datePublic": "2018-01-24T00:00:00", "descriptions": [ { "lang": "en", "value": "libcurl 7.49.0 to and including 7.57.0 contains an out bounds read in code handling HTTP/2 trailers. It was reported (https://github.com/curl/curl/pull/2231) that reading an HTTP/2 trailer could mess up future trailers since the stored size was one byte less than required. The problem is that the code that creates HTTP/1-like headers from the HTTP/2 trailer data once appended a string like `:` to the target buffer, while this was recently changed to `: ` (a space was added after the colon) but the following math wasn\u0027t updated correspondingly. When accessed, the data is read out of bounds and causes either a crash or that the (too large) data gets passed to client write. This could lead to a denial-of-service situation or an information disclosure if someone has a service that echoes back or uses the trailers for something." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-06-18T21:06:04", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1040273", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1040273" }, { "name": "USN-3554-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3554-1/" }, { "name": "DSA-4098", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4098" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://curl.haxx.se/docs/adv_2018-824a.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/curl/curl/pull/2231" }, { "name": "RHSA-2019:1543", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:1543" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "DATE_ASSIGNED": "2018-01-17", "ID": "CVE-2018-1000005", "REQUESTER": "daniel@haxx.se", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "libcurl 7.49.0 to and including 7.57.0 contains an out bounds read in code handling HTTP/2 trailers. It was reported (https://github.com/curl/curl/pull/2231) that reading an HTTP/2 trailer could mess up future trailers since the stored size was one byte less than required. The problem is that the code that creates HTTP/1-like headers from the HTTP/2 trailer data once appended a string like `:` to the target buffer, while this was recently changed to `: ` (a space was added after the colon) but the following math wasn\u0027t updated correspondingly. When accessed, the data is read out of bounds and causes either a crash or that the (too large) data gets passed to client write. This could lead to a denial-of-service situation or an information disclosure if someone has a service that echoes back or uses the trailers for something." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1040273", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1040273" }, { "name": "USN-3554-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3554-1/" }, { "name": "DSA-4098", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4098" }, { "name": "https://curl.haxx.se/docs/adv_2018-824a.html", "refsource": "CONFIRM", "url": "https://curl.haxx.se/docs/adv_2018-824a.html" }, { "name": "https://github.com/curl/curl/pull/2231", "refsource": "CONFIRM", "url": "https://github.com/curl/curl/pull/2231" }, { "name": "RHSA-2019:1543", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:1543" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-1000005", "datePublished": "2018-01-24T22:00:00", "dateReserved": "2018-01-17T00:00:00", "dateUpdated": "2024-08-05T12:33:49.200Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-32928 (GCVE-0-2024-32928)
Vulnerability from cvelistv5
Published
2024-08-19 16:38
Modified
2025-03-14 15:47
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Information disclosure
Summary
The libcurl CURLOPT_SSL_VERIFYPEER option was disabled on a subset of requests made by Nest production devices which enabled a potential man-in-the-middle attack on requests to Google cloud services by any host the traffic was routed through.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Nest Speakers |
Version: libcurl |
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-32928", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-19T19:22:12.314312Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-295", "description": "CWE-295 Improper Certificate Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-14T15:47:28.052Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Nest Speakers", "vendor": "Google", "versions": [ { "status": "affected", "version": "libcurl" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eThe libcurl CURLOPT_SSL_VERIFYPEER option was disabled on a subset of requests made by Nest production devices which enabled a potential man-in-the-middle attack on requests to Google cloud services by any host the traffic was routed through.\u003c/p\u003e" } ], "value": "The libcurl CURLOPT_SSL_VERIFYPEER option was disabled on a subset of requests made by Nest production devices which enabled a potential man-in-the-middle attack on requests to Google cloud services by any host the traffic was routed through." } ], "problemTypes": [ { "descriptions": [ { "description": "Information disclosure", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-19T16:38:06.615Z", "orgId": "83238938-5644-45f0-9007-c0392bcf6222", "shortName": "Google_Devices" }, "references": [ { "url": "https://support.google.com/product-documentation/answer/14771247?hl=en\u0026ref_topic=12974021\u0026sjid=9111851316942032590-NA#zippy=" } ] } }, "cveMetadata": { "assignerOrgId": "83238938-5644-45f0-9007-c0392bcf6222", "assignerShortName": "Google_Devices", "cveId": "CVE-2024-32928", "datePublished": "2024-08-19T16:38:01.140Z", "dateReserved": "2024-04-19T15:12:13.576Z", "dateUpdated": "2025-03-14T15:47:28.052Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-8817 (GCVE-0-2017-8817)
Vulnerability from cvelistv5
Published
2017-11-29 18:00
Modified
2024-08-05 16:48
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- out-of-bounds read
Summary
The FTP wildcard function in curl and libcurl before 7.57.0 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) or possibly have unspecified other impact via a string that ends with an '[' character.
References
► | URL | Tags | ||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | curl and libcurl before 7.57.0 |
Version: curl and libcurl before 7.57.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T16:48:21.954Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-201712-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201712-04" }, { "name": "RHSA-2018:3558", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:3558" }, { "name": "102057", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/102057" }, { "name": "[debian-lts-announce] 20171130 [SECURITY] [DLA 1195-1] curl security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00040.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://security.cucumberlinux.com/security/details.php?id=162" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://curl.haxx.se/docs/adv_2017-ae72.html" }, { "name": "1039897", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1039897" }, { "name": "DSA-4051", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2017/dsa-4051" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "curl and libcurl before 7.57.0", "vendor": "n/a", "versions": [ { "status": "affected", "version": "curl and libcurl before 7.57.0" } ] } ], "datePublic": "2017-11-29T00:00:00", "descriptions": [ { "lang": "en", "value": "The FTP wildcard function in curl and libcurl before 7.57.0 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) or possibly have unspecified other impact via a string that ends with an \u0027[\u0027 character." } ], "problemTypes": [ { "descriptions": [ { "description": "out-of-bounds read", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-11-13T10:57:01", "orgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "shortName": "debian" }, "references": [ { "name": "GLSA-201712-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201712-04" }, { "name": "RHSA-2018:3558", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:3558" }, { "name": "102057", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/102057" }, { "name": "[debian-lts-announce] 20171130 [SECURITY] [DLA 1195-1] curl security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00040.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://security.cucumberlinux.com/security/details.php?id=162" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://curl.haxx.se/docs/adv_2017-ae72.html" }, { "name": "1039897", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1039897" }, { "name": "DSA-4051", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2017/dsa-4051" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@debian.org", "ID": "CVE-2017-8817", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "curl and libcurl before 7.57.0", "version": { "version_data": [ { "version_value": "curl and libcurl before 7.57.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The FTP wildcard function in curl and libcurl before 7.57.0 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) or possibly have unspecified other impact via a string that ends with an \u0027[\u0027 character." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "out-of-bounds read" } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-201712-04", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201712-04" }, { "name": "RHSA-2018:3558", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:3558" }, { "name": "102057", "refsource": "BID", "url": "http://www.securityfocus.com/bid/102057" }, { "name": "[debian-lts-announce] 20171130 [SECURITY] [DLA 1195-1] curl security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00040.html" }, { "name": "http://security.cucumberlinux.com/security/details.php?id=162", "refsource": "CONFIRM", "url": "http://security.cucumberlinux.com/security/details.php?id=162" }, { "name": "https://curl.haxx.se/docs/adv_2017-ae72.html", "refsource": "CONFIRM", "url": "https://curl.haxx.se/docs/adv_2017-ae72.html" }, { "name": "1039897", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1039897" }, { "name": "DSA-4051", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2017/dsa-4051" } ] } } } }, "cveMetadata": { "assignerOrgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "assignerShortName": "debian", "cveId": "CVE-2017-8817", "datePublished": "2017-11-29T18:00:00", "dateReserved": "2017-05-07T00:00:00", "dateUpdated": "2024-08-05T16:48:21.954Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-4545 (GCVE-0-2013-4545)
Vulnerability from cvelistv5
Published
2013-11-23 11:00
Modified
2024-08-06 16:45
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
cURL and libcurl 7.18.0 through 7.32.0, when built with OpenSSL, disables the certificate CN and SAN name field verification (CURLOPT_SSL_VERIFYHOST) when the digital signature verification (CURLOPT_SSL_VERIFYPEER) is disabled, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
References
► | URL | Tags | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:45:14.830Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "name": "HPSBMU03112", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "https://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04463322" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://curl.haxx.se/docs/adv_20131115.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html" }, { "name": "DSA-2798", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2013/dsa-2798" }, { "name": "openSUSE-SU-2013:1859", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00047.html" }, { "name": "USN-2048-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2048-1" }, { "name": "openSUSE-SU-2013:1865", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00053.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-11-15T00:00:00", "descriptions": [ { "lang": "en", "value": "cURL and libcurl 7.18.0 through 7.32.0, when built with OpenSSL, disables the certificate CN and SAN name field verification (CURLOPT_SSL_VERIFYHOST) when the digital signature verification (CURLOPT_SSL_VERIFYPEER) is disabled, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-06-15T19:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "name": "HPSBMU03112", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "https://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04463322" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://curl.haxx.se/docs/adv_20131115.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html" }, { "name": "DSA-2798", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2013/dsa-2798" }, { "name": "openSUSE-SU-2013:1859", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00047.html" }, { "name": "USN-2048-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2048-1" }, { "name": "openSUSE-SU-2013:1865", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00053.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4545", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "cURL and libcurl 7.18.0 through 7.32.0, when built with OpenSSL, disables the certificate CN and SAN name field verification (CURLOPT_SSL_VERIFYHOST) when the digital signature verification (CURLOPT_SSL_VERIFYPEER) is disabled, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "name": "HPSBMU03112", "refsource": "HP", "url": "https://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04463322" }, { "name": "http://curl.haxx.se/docs/adv_20131115.html", "refsource": "CONFIRM", "url": "http://curl.haxx.se/docs/adv_20131115.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html" }, { "name": "DSA-2798", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2013/dsa-2798" }, { "name": "openSUSE-SU-2013:1859", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00047.html" }, { "name": "USN-2048-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2048-1" }, { "name": "openSUSE-SU-2013:1865", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00053.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-4545", "datePublished": "2013-11-23T11:00:00", "dateReserved": "2013-06-12T00:00:00", "dateUpdated": "2024-08-06T16:45:14.830Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2015-3144 (GCVE-0-2015-3144)
Vulnerability from cvelistv5
Published
2015-04-24 14:00
Modified
2024-08-06 05:39
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The fix_hostname function in cURL and libcurl 7.37.0 through 7.41.0 does not properly calculate an index, which allows remote attackers to cause a denial of service (out-of-bounds read or write and crash) or possibly have other unspecified impact via a zero-length host name, as demonstrated by "http://:80" and ":80."
References
► | URL | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T05:39:31.551Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "FEDORA-2015-6853", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157188.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html" }, { "name": "DSA-3232", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2015/dsa-3232" }, { "name": "74300", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/74300" }, { "name": "USN-2591-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2591-1" }, { "name": "1032232", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1032232" }, { "name": "APPLE-SA-2015-08-13-2", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10743" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html" }, { "name": "openSUSE-SU-2015:0799", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00057.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT205031" }, { "name": "GLSA-201509-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201509-02" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://curl.haxx.se/docs/adv_20150422D.html" }, { "name": "FEDORA-2015-6728", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157017.html" }, { "name": "FEDORA-2015-6695", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155957.html" }, { "name": "FEDORA-2015-6864", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156945.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-04-22T00:00:00", "descriptions": [ { "lang": "en", "value": "The fix_hostname function in cURL and libcurl 7.37.0 through 7.41.0 does not properly calculate an index, which allows remote attackers to cause a denial of service (out-of-bounds read or write and crash) or possibly have other unspecified impact via a zero-length host name, as demonstrated by \"http://:80\" and \":80.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-17T00:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "FEDORA-2015-6853", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157188.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html" }, { "name": "DSA-3232", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2015/dsa-3232" }, { "name": "74300", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/74300" }, { "name": "USN-2591-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2591-1" }, { "name": "1032232", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1032232" }, { "name": "APPLE-SA-2015-08-13-2", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10743" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html" }, { "name": "openSUSE-SU-2015:0799", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00057.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT205031" }, { "name": "GLSA-201509-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201509-02" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://curl.haxx.se/docs/adv_20150422D.html" }, { "name": "FEDORA-2015-6728", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157017.html" }, { "name": "FEDORA-2015-6695", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155957.html" }, { "name": "FEDORA-2015-6864", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156945.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2015-3144", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The fix_hostname function in cURL and libcurl 7.37.0 through 7.41.0 does not properly calculate an index, which allows remote attackers to cause a denial of service (out-of-bounds read or write and crash) or possibly have other unspecified impact via a zero-length host name, as demonstrated by \"http://:80\" and \":80.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "FEDORA-2015-6853", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157188.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html" }, { "name": "DSA-3232", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2015/dsa-3232" }, { "name": "74300", "refsource": "BID", "url": "http://www.securityfocus.com/bid/74300" }, { "name": "USN-2591-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2591-1" }, { "name": "1032232", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1032232" }, { "name": "APPLE-SA-2015-08-13-2", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10743", "refsource": "CONFIRM", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10743" }, { "name": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html" }, { "name": "openSUSE-SU-2015:0799", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00057.html" }, { "name": "https://support.apple.com/kb/HT205031", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT205031" }, { "name": "GLSA-201509-02", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201509-02" }, { "name": "http://curl.haxx.se/docs/adv_20150422D.html", "refsource": "CONFIRM", "url": "http://curl.haxx.se/docs/adv_20150422D.html" }, { "name": "FEDORA-2015-6728", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157017.html" }, { "name": "FEDORA-2015-6695", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155957.html" }, { "name": "FEDORA-2015-6864", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156945.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2015-3144", "datePublished": "2015-04-24T14:00:00", "dateReserved": "2015-04-10T00:00:00", "dateUpdated": "2024-08-06T05:39:31.551Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-38545 (GCVE-0-2023-38545)
Vulnerability from cvelistv5
Published
2023-10-18 03:52
Modified
2025-05-01 03:55
Severity ?
VLAI Severity ?
EPSS score ?
Summary
This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy
handshake.
When curl is asked to pass along the host name to the SOCKS5 proxy to allow
that to resolve the address instead of it getting done by curl itself, the
maximum length that host name can be is 255 bytes.
If the host name is detected to be longer, curl switches to local name
resolving and instead passes on the resolved address only. Due to this bug,
the local variable that means "let the host resolve the name" could get the
wrong value during a slow SOCKS5 handshake, and contrary to the intention,
copy the too long host name to the target buffer instead of copying just the
resolved address there.
The target buffer being a heap based buffer, and the host name coming from the
URL that curl has been told to operate with.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:46:56.235Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://curl.se/docs/CVE-2023-38545.html" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20231027-0009/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OGMXNRNSJ4ETDK6FRNU3J7SABXPWCHSQ/" }, { "tags": [ "x_transferred" ], "url": "https://www.secpod.com/blog/high-severity-heap-buffer-overflow-vulnerability/" }, { "tags": [ "x_transferred" ], "url": "https://support.apple.com/kb/HT214036" }, { "tags": [ "x_transferred" ], "url": "https://support.apple.com/kb/HT214063" }, { "tags": [ "x_transferred" ], "url": "https://support.apple.com/kb/HT214057" }, { "tags": [ "x_transferred" ], "url": "https://support.apple.com/kb/HT214058" }, { "tags": [ "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2024/Jan/34" }, { "tags": [ "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2024/Jan/37" }, { "tags": [ "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2024/Jan/38" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20240201-0005/" }, { "tags": [ "x_transferred" ], "url": "https://forum.vmssoftware.com/viewtopic.php?f=8\u0026t=8868" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-38545", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "" } ], "role": "CISA Coordinator", "timestamp": "2024-07-19T00:00:00+00:00", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-01T03:55:06.157Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "references": [ { "tags": [ "exploit" ], "url": "https://github.com/bcdannyboy/CVE-2023-38545" }, { "tags": [ "exploit" ], "url": "https://github.com/dbrugman/CVE-2023-38545-POC" }, { "tags": [ "exploit" ], "url": "https://github.com/UTsweetyfish/CVE-2023-38545" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "curl", "vendor": "curl", "versions": [ { "lessThan": "8.4.0", "status": "affected", "version": "8.4.0", "versionType": "semver" }, { "lessThan": "7.69.0", "status": "unaffected", "version": "7.69.0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \"let the host resolve the name\" could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with." } ], "providerMetadata": { "dateUpdated": "2024-07-09T13:27:08.128Z", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "url": "https://curl.se/docs/CVE-2023-38545.html" }, { "url": "https://security.netapp.com/advisory/ntap-20231027-0009/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OGMXNRNSJ4ETDK6FRNU3J7SABXPWCHSQ/" }, { "url": "https://www.secpod.com/blog/high-severity-heap-buffer-overflow-vulnerability/" }, { "url": "https://support.apple.com/kb/HT214036" }, { "url": "https://support.apple.com/kb/HT214063" }, { "url": "https://support.apple.com/kb/HT214057" }, { "url": "https://support.apple.com/kb/HT214058" }, { "url": "http://seclists.org/fulldisclosure/2024/Jan/34" }, { "url": "http://seclists.org/fulldisclosure/2024/Jan/37" }, { "url": "http://seclists.org/fulldisclosure/2024/Jan/38" }, { "url": "https://security.netapp.com/advisory/ntap-20240201-0005/" }, { "url": "https://forum.vmssoftware.com/viewtopic.php?f=8\u0026t=8868" } ] } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2023-38545", "datePublished": "2023-10-18T03:52:00.816Z", "dateReserved": "2023-07-20T01:00:12.444Z", "dateUpdated": "2025-05-01T03:55:06.157Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-5436 (GCVE-0-2019-5436)
Vulnerability from cvelistv5
Published
2019-05-28 18:47
Modified
2024-08-04 19:54
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-122 - Heap Overflow ()
Summary
A heap buffer overflow in the TFTP receiving code allows for DoS or arbitrary code execution in libcurl versions 7.19.4 through 7.64.1.
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T19:54:53.472Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "openSUSE-SU-2019:1492", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00008.html" }, { "name": "openSUSE-SU-2019:1508", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00017.html" }, { "name": "FEDORA-2019-697de0501f", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SMG3V4VTX2SE3EW3HQTN3DDLQBTORQC2/" }, { "name": "[oss-security] 20190911 [SECURITY ADVISORY] curl: TFTP small blocksize heap buffer overflow", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2019/09/11/6" }, { "name": "DSA-4633", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2020/dsa-4633" }, { "name": "20200225 [SECURITY] [DSA 4633-1] curl security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2020/Feb/36" }, { "name": "GLSA-202003-29", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202003-29" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20190606-0004/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://curl.haxx.se/docs/CVE-2019-5436.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.f5.com/csp/article/K55133295" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.f5.com/csp/article/K55133295?utm_source=f5support\u0026amp%3Butm_medium=RSS" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "curl", "vendor": "curl", "versions": [ { "status": "affected", "version": "Fixed in 7.65.0" } ] } ], "datePublic": "2019-05-22T00:00:00", "descriptions": [ { "lang": "en", "value": "A heap buffer overflow in the TFTP receiving code allows for DoS or arbitrary code execution in libcurl versions 7.19.4 through 7.64.1." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "Heap Overflow (CWE-122)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-10-20T21:15:00", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "name": "openSUSE-SU-2019:1492", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00008.html" }, { "name": "openSUSE-SU-2019:1508", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00017.html" }, { "name": "FEDORA-2019-697de0501f", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SMG3V4VTX2SE3EW3HQTN3DDLQBTORQC2/" }, { "name": "[oss-security] 20190911 [SECURITY ADVISORY] curl: TFTP small blocksize heap buffer overflow", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2019/09/11/6" }, { "name": "DSA-4633", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2020/dsa-4633" }, { "name": "20200225 [SECURITY] [DSA 4633-1] curl security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2020/Feb/36" }, { "name": "GLSA-202003-29", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202003-29" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20190606-0004/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://curl.haxx.se/docs/CVE-2019-5436.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.f5.com/csp/article/K55133295" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.f5.com/csp/article/K55133295?utm_source=f5support\u0026amp%3Butm_medium=RSS" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "support@hackerone.com", "ID": "CVE-2019-5436", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "curl", "version": { "version_data": [ { "version_value": "Fixed in 7.65.0" } ] } } ] }, "vendor_name": "curl" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A heap buffer overflow in the TFTP receiving code allows for DoS or arbitrary code execution in libcurl versions 7.19.4 through 7.64.1." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Heap Overflow (CWE-122)" } ] } ] }, "references": { "reference_data": [ { "name": "openSUSE-SU-2019:1492", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00008.html" }, { "name": "openSUSE-SU-2019:1508", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00017.html" }, { "name": "FEDORA-2019-697de0501f", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SMG3V4VTX2SE3EW3HQTN3DDLQBTORQC2/" }, { "name": "[oss-security] 20190911 [SECURITY ADVISORY] curl: TFTP small blocksize heap buffer overflow", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2019/09/11/6" }, { "name": "DSA-4633", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2020/dsa-4633" }, { "name": "20200225 [SECURITY] [DSA 4633-1] curl security update", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2020/Feb/36" }, { "name": "GLSA-202003-29", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202003-29" }, { "name": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "name": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html", "refsource": "MISC", "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" }, { "name": "https://www.oracle.com/security-alerts/cpuoct2020.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "name": "https://security.netapp.com/advisory/ntap-20190606-0004/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20190606-0004/" }, { "name": "https://curl.haxx.se/docs/CVE-2019-5436.html", "refsource": "CONFIRM", "url": "https://curl.haxx.se/docs/CVE-2019-5436.html" }, { "name": "https://support.f5.com/csp/article/K55133295", "refsource": "CONFIRM", "url": "https://support.f5.com/csp/article/K55133295" }, { "name": "https://support.f5.com/csp/article/K55133295?utm_source=f5support\u0026amp;utm_medium=RSS", "refsource": "CONFIRM", "url": "https://support.f5.com/csp/article/K55133295?utm_source=f5support\u0026amp;utm_medium=RSS" } ] } } } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2019-5436", "datePublished": "2019-05-28T18:47:32", "dateReserved": "2019-01-04T00:00:00", "dateUpdated": "2024-08-04T19:54:53.472Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-5419 (GCVE-0-2016-5419)
Vulnerability from cvelistv5
Published
2016-08-10 14:00
Modified
2024-08-06 01:01
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
curl and libcurl before 7.50.1 do not prevent TLS session resumption when the client certificate has changed, which allows remote attackers to bypass intended restrictions by resuming a session.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T01:01:00.484Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2016:2575", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2575.html" }, { "name": "92319", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/92319" }, { "name": "92292", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/92292" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://curl.haxx.se/docs/adv_20160803A.html" }, { "name": "RHSA-2018:3558", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:3558" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://source.android.com/security/bulletin/2016-12-01.html" }, { "name": "1038341", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1038341" }, { "name": "SSA:2016-219-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred" ], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.563059" }, { "name": "DSA-3638", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2016/dsa-3638" }, { "name": "1036538", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1036538" }, { "name": "openSUSE-SU-2016:2227", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-09/msg00011.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.tenable.com/security/tns-2016-18" }, { "name": "openSUSE-SU-2016:2379", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-09/msg00094.html" }, { "name": "FEDORA-2016-24316f1f56", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GLPXQQKURBQFM4XM6645VRPTOE2AWG33/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "name": "FEDORA-2016-8354baae0f", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K3GQH4V3XAQ5Z53AMQRDEC3C3UHTW7QR/" }, { "name": "RHSA-2016:2957", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2957.html" }, { "name": "GLSA-201701-47", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201701-47" }, { "name": "USN-3048-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-3048-1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-08-03T00:00:00", "descriptions": [ { "lang": "en", "value": "curl and libcurl before 7.50.1 do not prevent TLS session resumption when the client certificate has changed, which allows remote attackers to bypass intended restrictions by resuming a session." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-11-13T10:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "RHSA-2016:2575", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2575.html" }, { "name": "92319", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/92319" }, { "name": "92292", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/92292" }, { "tags": [ "x_refsource_MISC" ], "url": "https://curl.haxx.se/docs/adv_20160803A.html" }, { "name": "RHSA-2018:3558", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:3558" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://source.android.com/security/bulletin/2016-12-01.html" }, { "name": "1038341", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1038341" }, { "name": "SSA:2016-219-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE" ], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.563059" }, { "name": "DSA-3638", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2016/dsa-3638" }, { "name": "1036538", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1036538" }, { "name": "openSUSE-SU-2016:2227", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-09/msg00011.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.tenable.com/security/tns-2016-18" }, { "name": "openSUSE-SU-2016:2379", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-09/msg00094.html" }, { "name": "FEDORA-2016-24316f1f56", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GLPXQQKURBQFM4XM6645VRPTOE2AWG33/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "name": "FEDORA-2016-8354baae0f", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K3GQH4V3XAQ5Z53AMQRDEC3C3UHTW7QR/" }, { "name": "RHSA-2016:2957", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2957.html" }, { "name": "GLSA-201701-47", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201701-47" }, { "name": "USN-3048-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-3048-1" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-5419", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "curl and libcurl before 7.50.1 do not prevent TLS session resumption when the client certificate has changed, which allows remote attackers to bypass intended restrictions by resuming a session." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2016:2575", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-2575.html" }, { "name": "92319", "refsource": "BID", "url": "http://www.securityfocus.com/bid/92319" }, { "name": "92292", "refsource": "BID", "url": "http://www.securityfocus.com/bid/92292" }, { "name": "https://curl.haxx.se/docs/adv_20160803A.html", "refsource": "MISC", "url": "https://curl.haxx.se/docs/adv_20160803A.html" }, { "name": "RHSA-2018:3558", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:3558" }, { "name": "https://source.android.com/security/bulletin/2016-12-01.html", "refsource": "CONFIRM", "url": "https://source.android.com/security/bulletin/2016-12-01.html" }, { "name": "1038341", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1038341" }, { "name": "SSA:2016-219-01", "refsource": "SLACKWARE", "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.563059" }, { "name": "DSA-3638", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2016/dsa-3638" }, { "name": "1036538", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1036538" }, { "name": "openSUSE-SU-2016:2227", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2016-09/msg00011.html" }, { "name": "https://www.tenable.com/security/tns-2016-18", "refsource": "CONFIRM", "url": "https://www.tenable.com/security/tns-2016-18" }, { "name": "openSUSE-SU-2016:2379", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2016-09/msg00094.html" }, { "name": "FEDORA-2016-24316f1f56", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GLPXQQKURBQFM4XM6645VRPTOE2AWG33/" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "name": "FEDORA-2016-8354baae0f", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K3GQH4V3XAQ5Z53AMQRDEC3C3UHTW7QR/" }, { "name": "RHSA-2016:2957", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-2957.html" }, { "name": "GLSA-201701-47", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201701-47" }, { "name": "USN-3048-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3048-1" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2016-5419", "datePublished": "2016-08-10T14:00:00", "dateReserved": "2016-06-10T00:00:00", "dateUpdated": "2024-08-06T01:01:00.484Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-0249 (GCVE-0-2013-0249)
Vulnerability from cvelistv5
Published
2013-03-08 22:00
Modified
2024-08-06 14:18
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Stack-based buffer overflow in the Curl_sasl_create_digest_md5_message function in lib/curl_sasl.c in curl and libcurl 7.26.0 through 7.28.1, when negotiating SASL DIGEST-MD5 authentication, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long string in the realm parameter in a (1) POP3, (2) SMTP or (3) IMAP message.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T14:18:09.560Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/120170/Slackware-Security-Advisory-curl-Updates.html" }, { "name": "57842", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/57842" }, { "name": "APPLE-SA-2013-10-22-3", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html" }, { "name": "24487", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "http://www.exploit-db.com/exploits/24487" }, { "name": "USN-1721-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1721-1" }, { "name": "FEDORA-2013-2098", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-February/099140.html" }, { "name": "1028093", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1028093" }, { "name": "89988", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/89988" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/120147/cURL-Buffer-Overflow.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://blog.volema.com/curl-rce.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://curl.haxx.se/docs/adv_20130206.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://nakedsecurity.sophos.com/2013/02/10/anatomy-of-a-vulnerability-curl-web-download-toolkit-holed-by-authentication-bug/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-02-06T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the Curl_sasl_create_digest_md5_message function in lib/curl_sasl.c in curl and libcurl 7.26.0 through 7.28.1, when negotiating SASL DIGEST-MD5 authentication, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long string in the realm parameter in a (1) POP3, (2) SMTP or (3) IMAP message." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-06T18:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/120170/Slackware-Security-Advisory-curl-Updates.html" }, { "name": "57842", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/57842" }, { "name": "APPLE-SA-2013-10-22-3", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html" }, { "name": "24487", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "http://www.exploit-db.com/exploits/24487" }, { "name": "USN-1721-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1721-1" }, { "name": "FEDORA-2013-2098", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-February/099140.html" }, { "name": "1028093", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1028093" }, { "name": "89988", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/89988" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/120147/cURL-Buffer-Overflow.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://blog.volema.com/curl-rce.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://curl.haxx.se/docs/adv_20130206.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://nakedsecurity.sophos.com/2013/02/10/anatomy-of-a-vulnerability-curl-web-download-toolkit-holed-by-authentication-bug/" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-0249", "datePublished": "2013-03-08T22:00:00", "dateReserved": "2012-12-06T00:00:00", "dateUpdated": "2024-08-06T14:18:09.560Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-6422 (GCVE-0-2013-6422)
Vulnerability from cvelistv5
Published
2013-12-23 22:00
Modified
2024-08-06 17:39
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The GnuTLS backend in libcurl 7.21.4 through 7.33.0, when disabling digital signature verification (CURLOPT_SSL_VERIFYPEER), also disables the CURLOPT_SSL_VERIFYHOST check for CN or SAN host name fields, which makes it easier for remote attackers to spoof servers and conduct man-in-the-middle (MITM) attacks.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T17:39:01.250Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://curl.haxx.se/docs/adv_20131217.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "name": "HPSBMU03112", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "https://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04463322" }, { "name": "DSA-2824", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2013/dsa-2824" }, { "name": "USN-2058-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2058-1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-12-17T00:00:00", "descriptions": [ { "lang": "en", "value": "The GnuTLS backend in libcurl 7.21.4 through 7.33.0, when disabling digital signature verification (CURLOPT_SSL_VERIFYPEER), also disables the CURLOPT_SSL_VERIFYHOST check for CN or SAN host name fields, which makes it easier for remote attackers to spoof servers and conduct man-in-the-middle (MITM) attacks." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2015-07-16T05:57:02", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://curl.haxx.se/docs/adv_20131217.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "name": "HPSBMU03112", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "https://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04463322" }, { "name": "DSA-2824", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2013/dsa-2824" }, { "name": "USN-2058-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2058-1" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-6422", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The GnuTLS backend in libcurl 7.21.4 through 7.33.0, when disabling digital signature verification (CURLOPT_SSL_VERIFYPEER), also disables the CURLOPT_SSL_VERIFYHOST check for CN or SAN host name fields, which makes it easier for remote attackers to spoof servers and conduct man-in-the-middle (MITM) attacks." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://curl.haxx.se/docs/adv_20131217.html", "refsource": "CONFIRM", "url": "http://curl.haxx.se/docs/adv_20131217.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "name": "HPSBMU03112", "refsource": "HP", "url": "https://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04463322" }, { "name": "DSA-2824", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2013/dsa-2824" }, { "name": "USN-2058-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2058-1" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-6422", "datePublished": "2013-12-23T22:00:00", "dateReserved": "2013-11-04T00:00:00", "dateUpdated": "2024-08-06T17:39:01.250Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2015-3143 (GCVE-0-2015-3143)
Vulnerability from cvelistv5
Published
2015-04-24 14:00
Modified
2024-08-06 05:39
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
cURL and libcurl 7.10.6 through 7.41.0 does not properly re-use NTLM connections, which allows remote attackers to connect as other users via an unauthenticated request, a similar issue to CVE-2014-0015.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T05:39:31.921Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "HPSBHF03544", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=145612005512270\u0026w=2" }, { "name": "FEDORA-2015-6853", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157188.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://curl.haxx.se/docs/adv_20150422A.html" }, { "name": "DSA-3232", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2015/dsa-3232" }, { "name": "FEDORA-2015-6712", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156250.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "name": "MDVSA-2015:219", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:219" }, { "name": "USN-2591-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2591-1" }, { "name": "1032232", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1032232" }, { "name": "APPLE-SA-2015-08-13-2", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html" }, { "name": "74299", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/74299" }, { "name": "RHSA-2015:1254", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1254.html" }, { "name": "MDVSA-2015:220", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:220" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10743" }, { "name": "openSUSE-SU-2015:0799", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00057.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://advisories.mageia.org/MGASA-2015-0179.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT205031" }, { "name": "GLSA-201509-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201509-02" }, { "name": "FEDORA-2015-6728", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157017.html" }, { "name": "FEDORA-2015-6695", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155957.html" }, { "name": "FEDORA-2015-6864", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156945.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-04-22T00:00:00", "descriptions": [ { "lang": "en", "value": "cURL and libcurl 7.10.6 through 7.41.0 does not properly re-use NTLM connections, which allows remote attackers to connect as other users via an unauthenticated request, a similar issue to CVE-2014-0015." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-04T19:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "HPSBHF03544", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=145612005512270\u0026w=2" }, { "name": "FEDORA-2015-6853", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157188.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://curl.haxx.se/docs/adv_20150422A.html" }, { "name": "DSA-3232", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2015/dsa-3232" }, { "name": "FEDORA-2015-6712", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156250.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "name": "MDVSA-2015:219", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:219" }, { "name": "USN-2591-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2591-1" }, { "name": "1032232", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1032232" }, { "name": "APPLE-SA-2015-08-13-2", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html" }, { "name": "74299", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/74299" }, { "name": "RHSA-2015:1254", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1254.html" }, { "name": "MDVSA-2015:220", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:220" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10743" }, { "name": "openSUSE-SU-2015:0799", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00057.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://advisories.mageia.org/MGASA-2015-0179.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT205031" }, { "name": "GLSA-201509-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201509-02" }, { "name": "FEDORA-2015-6728", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157017.html" }, { "name": "FEDORA-2015-6695", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155957.html" }, { "name": "FEDORA-2015-6864", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156945.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2015-3143", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "cURL and libcurl 7.10.6 through 7.41.0 does not properly re-use NTLM connections, which allows remote attackers to connect as other users via an unauthenticated request, a similar issue to CVE-2014-0015." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "HPSBHF03544", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=145612005512270\u0026w=2" }, { "name": "FEDORA-2015-6853", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157188.html" }, { "name": "http://curl.haxx.se/docs/adv_20150422A.html", "refsource": "CONFIRM", "url": "http://curl.haxx.se/docs/adv_20150422A.html" }, { "name": "DSA-3232", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2015/dsa-3232" }, { "name": "FEDORA-2015-6712", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156250.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "name": "MDVSA-2015:219", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:219" }, { "name": "USN-2591-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2591-1" }, { "name": "1032232", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1032232" }, { "name": "APPLE-SA-2015-08-13-2", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html" }, { "name": "74299", "refsource": "BID", "url": "http://www.securityfocus.com/bid/74299" }, { "name": "RHSA-2015:1254", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2015-1254.html" }, { "name": "MDVSA-2015:220", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:220" }, { "name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10743", "refsource": "CONFIRM", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10743" }, { "name": "openSUSE-SU-2015:0799", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00057.html" }, { "name": "http://advisories.mageia.org/MGASA-2015-0179.html", "refsource": "CONFIRM", "url": "http://advisories.mageia.org/MGASA-2015-0179.html" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763" }, { "name": "https://support.apple.com/kb/HT205031", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT205031" }, { "name": "GLSA-201509-02", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201509-02" }, { "name": "FEDORA-2015-6728", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157017.html" }, { "name": "FEDORA-2015-6695", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155957.html" }, { "name": "FEDORA-2015-6864", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156945.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2015-3143", "datePublished": "2015-04-24T14:00:00", "dateReserved": "2015-04-10T00:00:00", "dateUpdated": "2024-08-06T05:39:31.921Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2015-3237 (GCVE-0-2015-3237)
Vulnerability from cvelistv5
Published
2015-06-22 19:00
Modified
2024-08-06 05:39
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The smb_request_state function in cURL and libcurl 7.40.0 through 7.42.1 allows remote SMB servers to obtain sensitive information from memory or cause a denial of service (out-of-bounds read and crash) via crafted length and offset values.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T05:39:32.139Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "FEDORA-2015-10155", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160660.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05111017" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://curl.haxx.se/docs/adv_20150617B.html" }, { "name": "1036371", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1036371" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "name": "91787", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/91787" }, { "name": "GLSA-201509-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201509-02" }, { "name": "75387", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/75387" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-06-17T00:00:00", "descriptions": [ { "lang": "en", "value": "The smb_request_state function in cURL and libcurl 7.40.0 through 7.42.1 allows remote SMB servers to obtain sensitive information from memory or cause a denial of service (out-of-bounds read and crash) via crafted length and offset values." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-17T00:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "FEDORA-2015-10155", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160660.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05111017" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://curl.haxx.se/docs/adv_20150617B.html" }, { "name": "1036371", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1036371" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "name": "91787", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/91787" }, { "name": "GLSA-201509-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201509-02" }, { "name": "75387", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/75387" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2015-3237", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The smb_request_state function in cURL and libcurl 7.40.0 through 7.42.1 allows remote SMB servers to obtain sensitive information from memory or cause a denial of service (out-of-bounds read and crash) via crafted length and offset values." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "FEDORA-2015-10155", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160660.html" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05111017", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05111017" }, { "name": "http://curl.haxx.se/docs/adv_20150617B.html", "refsource": "CONFIRM", "url": "http://curl.haxx.se/docs/adv_20150617B.html" }, { "name": "1036371", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1036371" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380" }, { "name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "name": "91787", "refsource": "BID", "url": "http://www.securityfocus.com/bid/91787" }, { "name": "GLSA-201509-02", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201509-02" }, { "name": "75387", "refsource": "BID", "url": "http://www.securityfocus.com/bid/75387" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2015-3237", "datePublished": "2015-06-22T19:00:00", "dateReserved": "2015-04-10T00:00:00", "dateUpdated": "2024-08-06T05:39:32.139Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-5421 (GCVE-0-2016-5421)
Vulnerability from cvelistv5
Published
2016-08-10 14:00
Modified
2024-08-06 01:01
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Use-after-free vulnerability in libcurl before 7.50.1 allows attackers to control which connection is used or possibly have unspecified other impact via unknown vectors.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T01:01:00.161Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2018:3558", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:3558" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://source.android.com/security/bulletin/2016-12-01.html" }, { "name": "SSA:2016-219-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred" ], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.563059" }, { "name": "92306", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/92306" }, { "name": "DSA-3638", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2016/dsa-3638" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://curl.haxx.se/docs/adv_20160803C.html" }, { "name": "openSUSE-SU-2016:2227", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-09/msg00011.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.tenable.com/security/tns-2016-18" }, { "name": "openSUSE-SU-2016:2379", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-09/msg00094.html" }, { "name": "1036536", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1036536" }, { "name": "FEDORA-2016-24316f1f56", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GLPXQQKURBQFM4XM6645VRPTOE2AWG33/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "name": "FEDORA-2016-8354baae0f", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K3GQH4V3XAQ5Z53AMQRDEC3C3UHTW7QR/" }, { "name": "GLSA-201701-47", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201701-47" }, { "name": "USN-3048-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-3048-1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-08-03T00:00:00", "descriptions": [ { "lang": "en", "value": "Use-after-free vulnerability in libcurl before 7.50.1 allows attackers to control which connection is used or possibly have unspecified other impact via unknown vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-11-13T10:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "RHSA-2018:3558", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:3558" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://source.android.com/security/bulletin/2016-12-01.html" }, { "name": "SSA:2016-219-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE" ], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.563059" }, { "name": "92306", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/92306" }, { "name": "DSA-3638", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2016/dsa-3638" }, { "tags": [ "x_refsource_MISC" ], "url": "https://curl.haxx.se/docs/adv_20160803C.html" }, { "name": "openSUSE-SU-2016:2227", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-09/msg00011.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.tenable.com/security/tns-2016-18" }, { "name": "openSUSE-SU-2016:2379", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-09/msg00094.html" }, { "name": "1036536", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1036536" }, { "name": "FEDORA-2016-24316f1f56", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GLPXQQKURBQFM4XM6645VRPTOE2AWG33/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "name": "FEDORA-2016-8354baae0f", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K3GQH4V3XAQ5Z53AMQRDEC3C3UHTW7QR/" }, { "name": "GLSA-201701-47", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201701-47" }, { "name": "USN-3048-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-3048-1" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-5421", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Use-after-free vulnerability in libcurl before 7.50.1 allows attackers to control which connection is used or possibly have unspecified other impact via unknown vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2018:3558", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:3558" }, { "name": "https://source.android.com/security/bulletin/2016-12-01.html", "refsource": "CONFIRM", "url": "https://source.android.com/security/bulletin/2016-12-01.html" }, { "name": "SSA:2016-219-01", "refsource": "SLACKWARE", "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.563059" }, { "name": "92306", "refsource": "BID", "url": "http://www.securityfocus.com/bid/92306" }, { "name": "DSA-3638", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2016/dsa-3638" }, { "name": "https://curl.haxx.se/docs/adv_20160803C.html", "refsource": "MISC", "url": "https://curl.haxx.se/docs/adv_20160803C.html" }, { "name": "openSUSE-SU-2016:2227", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2016-09/msg00011.html" }, { "name": "https://www.tenable.com/security/tns-2016-18", "refsource": "CONFIRM", "url": "https://www.tenable.com/security/tns-2016-18" }, { "name": "openSUSE-SU-2016:2379", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2016-09/msg00094.html" }, { "name": "1036536", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1036536" }, { "name": "FEDORA-2016-24316f1f56", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GLPXQQKURBQFM4XM6645VRPTOE2AWG33/" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "name": "FEDORA-2016-8354baae0f", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K3GQH4V3XAQ5Z53AMQRDEC3C3UHTW7QR/" }, { "name": "GLSA-201701-47", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201701-47" }, { "name": "USN-3048-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3048-1" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2016-5421", "datePublished": "2016-08-10T14:00:00", "dateReserved": "2016-06-10T00:00:00", "dateUpdated": "2024-08-06T01:01:00.161Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-22890 (GCVE-0-2021-22890)
Vulnerability from cvelistv5
Published
2021-04-01 17:46
Modified
2025-06-09 15:11
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-300 - Man-in-the-Middle ()
Summary
curl 7.63.0 to and including 7.75.0 includes vulnerability that allows a malicious HTTPS proxy to MITM a connection due to bad handling of TLS 1.3 session tickets. When using a HTTPS proxy and TLS 1.3, libcurl can confuse session tickets arriving from the HTTPS proxy but work as if they arrived from the remote server and then wrongly "short-cut" the host handshake. When confusing the tickets, a HTTPS proxy can trick libcurl to use the wrong session ticket resume for the host and thereby circumvent the server TLS certificate check and make a MITM attack to be possible to perform unnoticed. Note that such a malicious HTTPS proxy needs to provide a certificate that curl will accept for the MITMed server for an attack to work - unless curl has been told to ignore the server certificate check.
References
► | URL | Tags | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | https://github.com/curl/curl |
Version: 7.63.0 to and including 7.75.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:58:25.687Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1129529" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://curl.se/docs/CVE-2021-22890.html" }, { "name": "FEDORA-2021-cab5c9befb", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC/" }, { "name": "FEDORA-2021-065371f385", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ/" }, { "name": "FEDORA-2021-26a293c72b", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP/" }, { "name": "GLSA-202105-36", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202105-36" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20210521-0007/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2021-22890", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-06-09T15:11:48.797076Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-09T15:11:58.900Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "https://github.com/curl/curl", "vendor": "n/a", "versions": [ { "status": "affected", "version": "7.63.0 to and including 7.75.0" } ] } ], "descriptions": [ { "lang": "en", "value": "curl 7.63.0 to and including 7.75.0 includes vulnerability that allows a malicious HTTPS proxy to MITM a connection due to bad handling of TLS 1.3 session tickets. When using a HTTPS proxy and TLS 1.3, libcurl can confuse session tickets arriving from the HTTPS proxy but work as if they arrived from the remote server and then wrongly \"short-cut\" the host handshake. When confusing the tickets, a HTTPS proxy can trick libcurl to use the wrong session ticket resume for the host and thereby circumvent the server TLS certificate check and make a MITM attack to be possible to perform unnoticed. Note that such a malicious HTTPS proxy needs to provide a certificate that curl will accept for the MITMed server for an attack to work - unless curl has been told to ignore the server certificate check." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-300", "description": "Man-in-the-Middle (CWE-300)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-08T14:08:39.000Z", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1129529" }, { "tags": [ "x_refsource_MISC" ], "url": "https://curl.se/docs/CVE-2021-22890.html" }, { "name": "FEDORA-2021-cab5c9befb", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC/" }, { "name": "FEDORA-2021-065371f385", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ/" }, { "name": "FEDORA-2021-26a293c72b", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP/" }, { "name": "GLSA-202105-36", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202105-36" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20210521-0007/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "support@hackerone.com", "ID": "CVE-2021-22890", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "https://github.com/curl/curl", "version": { "version_data": [ { "version_value": "7.63.0 to and including 7.75.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "curl 7.63.0 to and including 7.75.0 includes vulnerability that allows a malicious HTTPS proxy to MITM a connection due to bad handling of TLS 1.3 session tickets. When using a HTTPS proxy and TLS 1.3, libcurl can confuse session tickets arriving from the HTTPS proxy but work as if they arrived from the remote server and then wrongly \"short-cut\" the host handshake. When confusing the tickets, a HTTPS proxy can trick libcurl to use the wrong session ticket resume for the host and thereby circumvent the server TLS certificate check and make a MITM attack to be possible to perform unnoticed. Note that such a malicious HTTPS proxy needs to provide a certificate that curl will accept for the MITMed server for an attack to work - unless curl has been told to ignore the server certificate check." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Man-in-the-Middle (CWE-300)" } ] } ] }, "references": { "reference_data": [ { "name": "https://hackerone.com/reports/1129529", "refsource": "MISC", "url": "https://hackerone.com/reports/1129529" }, { "name": "https://curl.se/docs/CVE-2021-22890.html", "refsource": "MISC", "url": "https://curl.se/docs/CVE-2021-22890.html" }, { "name": "FEDORA-2021-cab5c9befb", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC/" }, { "name": "FEDORA-2021-065371f385", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ/" }, { "name": "FEDORA-2021-26a293c72b", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP/" }, { "name": "GLSA-202105-36", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202105-36" }, { "name": "https://www.oracle.com//security-alerts/cpujul2021.html", "refsource": "MISC", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "name": "https://security.netapp.com/advisory/ntap-20210521-0007/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210521-0007/" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2021-22890", "datePublished": "2021-04-01T17:46:17.000Z", "dateReserved": "2021-01-06T00:00:00.000Z", "dateUpdated": "2025-06-09T15:11:58.900Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2014-2522 (GCVE-0-2014-2522)
Vulnerability from cvelistv5
Published
2014-04-18 19:00
Modified
2024-08-06 10:14
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
curl and libcurl 7.27.0 through 7.35.0, when running on Windows and using the SChannel/Winssl TLS backend, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate when accessing a URL that uses a numerical IP address, which allows man-in-the-middle attackers to spoof servers via an arbitrary valid certificate.
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:14:26.532Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095862" }, { "name": "57836", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/57836" }, { "name": "66296", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/66296" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.getchef.com/blog/2014/04/09/chef-server-11-0-12-release/" }, { "name": "59458", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59458" }, { "name": "[oss-security] 20140317 Re: CVE request: flaw in curl\u0027s Windows SSL backend", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://seclists.org/oss-sec/2014/q1/586" }, { "name": "57968", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/57968" }, { "name": "[oss-security] 20140317 CVE request: flaw in curl\u0027s Windows SSL backend", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://seclists.org/oss-sec/2014/q1/585" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://curl.haxx.se/docs/adv_20140326D.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.getchef.com/blog/2014/04/09/enterprise-chef-1-4-9-release/" }, { "name": "57966", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/57966" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-03-17T00:00:00", "descriptions": [ { "lang": "en", "value": "curl and libcurl 7.27.0 through 7.35.0, when running on Windows and using the SChannel/Winssl TLS backend, does not verify that the server hostname matches a domain name in the subject\u0027s Common Name (CN) or subjectAltName field of the X.509 certificate when accessing a URL that uses a numerical IP address, which allows man-in-the-middle attackers to spoof servers via an arbitrary valid certificate." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-04-28T18:57:02", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095862" }, { "name": "57836", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/57836" }, { "name": "66296", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/66296" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.getchef.com/blog/2014/04/09/chef-server-11-0-12-release/" }, { "name": "59458", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59458" }, { "name": "[oss-security] 20140317 Re: CVE request: flaw in curl\u0027s Windows SSL backend", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://seclists.org/oss-sec/2014/q1/586" }, { "name": "57968", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/57968" }, { "name": "[oss-security] 20140317 CVE request: flaw in curl\u0027s Windows SSL backend", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://seclists.org/oss-sec/2014/q1/585" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://curl.haxx.se/docs/adv_20140326D.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.getchef.com/blog/2014/04/09/enterprise-chef-1-4-9-release/" }, { "name": "57966", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/57966" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-2522", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "curl and libcurl 7.27.0 through 7.35.0, when running on Windows and using the SChannel/Winssl TLS backend, does not verify that the server hostname matches a domain name in the subject\u0027s Common Name (CN) or subjectAltName field of the X.509 certificate when accessing a URL that uses a numerical IP address, which allows man-in-the-middle attackers to spoof servers via an arbitrary valid certificate." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095862", "refsource": "CONFIRM", "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095862" }, { "name": "57836", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/57836" }, { "name": "66296", "refsource": "BID", "url": "http://www.securityfocus.com/bid/66296" }, { "name": "http://www.getchef.com/blog/2014/04/09/chef-server-11-0-12-release/", "refsource": "CONFIRM", "url": "http://www.getchef.com/blog/2014/04/09/chef-server-11-0-12-release/" }, { "name": "59458", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59458" }, { "name": "[oss-security] 20140317 Re: CVE request: flaw in curl\u0027s Windows SSL backend", "refsource": "MLIST", "url": "http://seclists.org/oss-sec/2014/q1/586" }, { "name": "57968", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/57968" }, { "name": "[oss-security] 20140317 CVE request: flaw in curl\u0027s Windows SSL backend", "refsource": "MLIST", "url": "http://seclists.org/oss-sec/2014/q1/585" }, { "name": "http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/", "refsource": "CONFIRM", "url": "http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/" }, { "name": "http://curl.haxx.se/docs/adv_20140326D.html", "refsource": "CONFIRM", "url": "http://curl.haxx.se/docs/adv_20140326D.html" }, { "name": "http://www.getchef.com/blog/2014/04/09/enterprise-chef-1-4-9-release/", "refsource": "CONFIRM", "url": "http://www.getchef.com/blog/2014/04/09/enterprise-chef-1-4-9-release/" }, { "name": "57966", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/57966" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-2522", "datePublished": "2014-04-18T19:00:00", "dateReserved": "2014-03-17T00:00:00", "dateUpdated": "2024-08-06T10:14:26.532Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2014-0139 (GCVE-0-2014-0139)
Vulnerability from cvelistv5
Published
2014-04-15 14:00
Modified
2024-08-06 09:05
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
cURL and libcurl 7.1 before 7.36.0, when using the OpenSSL, axtls, qsossl or gskit libraries for TLS, recognize a wildcard IP address in the subject's Common Name (CN) field of an X.509 certificate, which might allow man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T09:05:38.790Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095862" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "name": "MDVSA-2015:213", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:213" }, { "name": "57836", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/57836" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://curl.haxx.se/docs/adv_20140326B.html" }, { "name": "DSA-2902", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2014/dsa-2902" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.getchef.com/blog/2014/04/09/chef-server-11-0-12-release/" }, { "name": "59458", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59458" }, { "name": "openSUSE-SU-2014:0530", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-04/msg00042.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://advisories.mageia.org/MGASA-2015-0165.html" }, { "name": "58615", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/58615" }, { "name": "57968", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/57968" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21675820" }, { "name": "USN-2167-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2167-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.getchef.com/blog/2014/04/09/enterprise-chef-1-4-9-release/" }, { "name": "57966", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/57966" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-03-26T00:00:00", "descriptions": [ { "lang": "en", "value": "cURL and libcurl 7.1 before 7.36.0, when using the OpenSSL, axtls, qsossl or gskit libraries for TLS, recognize a wildcard IP address in the subject\u0027s Common Name (CN) field of an X.509 certificate, which might allow man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-12-15T17:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095862" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "name": "MDVSA-2015:213", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:213" }, { "name": "57836", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/57836" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://curl.haxx.se/docs/adv_20140326B.html" }, { "name": "DSA-2902", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2014/dsa-2902" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.getchef.com/blog/2014/04/09/chef-server-11-0-12-release/" }, { "name": "59458", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59458" }, { "name": "openSUSE-SU-2014:0530", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-04/msg00042.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://advisories.mageia.org/MGASA-2015-0165.html" }, { "name": "58615", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/58615" }, { "name": "57968", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/57968" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21675820" }, { "name": "USN-2167-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2167-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.getchef.com/blog/2014/04/09/enterprise-chef-1-4-9-release/" }, { "name": "57966", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/57966" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-0139", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "cURL and libcurl 7.1 before 7.36.0, when using the OpenSSL, axtls, qsossl or gskit libraries for TLS, recognize a wildcard IP address in the subject\u0027s Common Name (CN) field of an X.509 certificate, which might allow man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095862", "refsource": "CONFIRM", "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095862" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "name": "MDVSA-2015:213", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:213" }, { "name": "57836", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/57836" }, { "name": "http://curl.haxx.se/docs/adv_20140326B.html", "refsource": "CONFIRM", "url": "http://curl.haxx.se/docs/adv_20140326B.html" }, { "name": "DSA-2902", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2014/dsa-2902" }, { "name": "http://www.getchef.com/blog/2014/04/09/chef-server-11-0-12-release/", "refsource": "CONFIRM", "url": "http://www.getchef.com/blog/2014/04/09/chef-server-11-0-12-release/" }, { "name": "59458", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59458" }, { "name": "openSUSE-SU-2014:0530", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2014-04/msg00042.html" }, { "name": "http://advisories.mageia.org/MGASA-2015-0165.html", "refsource": "CONFIRM", "url": "http://advisories.mageia.org/MGASA-2015-0165.html" }, { "name": "58615", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/58615" }, { "name": "57968", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/57968" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21675820", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21675820" }, { "name": "USN-2167-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2167-1" }, { "name": "http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/", "refsource": "CONFIRM", "url": "http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/" }, { "name": "http://www.getchef.com/blog/2014/04/09/enterprise-chef-1-4-9-release/", "refsource": "CONFIRM", "url": "http://www.getchef.com/blog/2014/04/09/enterprise-chef-1-4-9-release/" }, { "name": "57966", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/57966" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2014-0139", "datePublished": "2014-04-15T14:00:00", "dateReserved": "2013-12-03T00:00:00", "dateUpdated": "2024-08-06T09:05:38.790Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-3823 (GCVE-0-2019-3823)
Vulnerability from cvelistv5
Published
2019-02-06 20:00
Modified
2024-08-04 19:19
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
libcurl versions from 7.34.0 to before 7.64.0 are vulnerable to a heap out-of-bounds read in the code handling the end-of-response for SMTP. If the buffer passed to `smtp_endofresp()` isn't NUL terminated and contains no character ending the parsed number, and `len` is set to 5, then the `strtol()` call reads beyond the allocated buffer. The read contents will not be returned to the caller.
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
The curl Project | curl |
Version: 7.64.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T19:19:18.612Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-201903-03", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201903-03" }, { "name": "DSA-4386", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2019/dsa-4386" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3823" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://curl.haxx.se/docs/CVE-2019-3823.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20190315-0001/" }, { "name": "USN-3882-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3882-1/" }, { "name": "106950", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/106950" }, { "name": "[infra-devnull] 20190404 [GitHub] [incubator-openwhisk-runtime-ballerina] falkzoll commented on issue #15: Update to new base image jdk8u202-b08_openj9-0.12.1.", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f%40%3Cdevnull.infra.apache.org%3E" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html" }, { "name": "RHSA-2019:3701", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:3701" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-936080.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "curl", "vendor": "The curl Project", "versions": [ { "status": "affected", "version": "7.64.0" } ] } ], "datePublic": "2019-02-06T00:00:00", "descriptions": [ { "lang": "en", "value": "libcurl versions from 7.34.0 to before 7.64.0 are vulnerable to a heap out-of-bounds read in the code handling the end-of-response for SMTP. If the buffer passed to `smtp_endofresp()` isn\u0027t NUL terminated and contains no character ending the parsed number, and `len` is set to 5, then the `strtol()` call reads beyond the allocated buffer. The read contents will not be returned to the caller." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-03-09T14:06:19", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "GLSA-201903-03", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201903-03" }, { "name": "DSA-4386", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2019/dsa-4386" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3823" }, { "tags": [ "x_refsource_MISC" ], "url": "https://curl.haxx.se/docs/CVE-2019-3823.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20190315-0001/" }, { "name": "USN-3882-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3882-1/" }, { "name": "106950", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/106950" }, { "name": "[infra-devnull] 20190404 [GitHub] [incubator-openwhisk-runtime-ballerina] falkzoll commented on issue #15: Update to new base image jdk8u202-b08_openj9-0.12.1.", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f%40%3Cdevnull.infra.apache.org%3E" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html" }, { "name": "RHSA-2019:3701", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:3701" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-936080.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2019-3823", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "curl", "version": { "version_data": [ { "version_value": "7.64.0" } ] } } ] }, "vendor_name": "The curl Project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "libcurl versions from 7.34.0 to before 7.64.0 are vulnerable to a heap out-of-bounds read in the code handling the end-of-response for SMTP. If the buffer passed to `smtp_endofresp()` isn\u0027t NUL terminated and contains no character ending the parsed number, and `len` is set to 5, then the `strtol()` call reads beyond the allocated buffer. The read contents will not be returned to the caller." } ] }, "impact": { "cvss": [ [ { "vectorString": "4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" } ] ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-125" } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-201903-03", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201903-03" }, { "name": "DSA-4386", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2019/dsa-4386" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3823", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3823" }, { "name": "https://curl.haxx.se/docs/CVE-2019-3823.html", "refsource": "MISC", "url": "https://curl.haxx.se/docs/CVE-2019-3823.html" }, { "name": "https://security.netapp.com/advisory/ntap-20190315-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20190315-0001/" }, { "name": "USN-3882-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3882-1/" }, { "name": "106950", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106950" }, { "name": "[infra-devnull] 20190404 [GitHub] [incubator-openwhisk-runtime-ballerina] falkzoll commented on issue #15: Update to new base image jdk8u202-b08_openj9-0.12.1.", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f@%3Cdevnull.infra.apache.org%3E" }, { "name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", "refsource": "MISC", "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "name": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html", "refsource": "MISC", "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html" }, { "name": "RHSA-2019:3701", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:3701" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-936080.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-936080.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2019-3823", "datePublished": "2019-02-06T20:00:00", "dateReserved": "2019-01-03T00:00:00", "dateUpdated": "2024-08-04T19:19:18.612Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-5420 (GCVE-0-2016-5420)
Vulnerability from cvelistv5
Published
2016-08-10 14:00
Modified
2024-08-06 01:01
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
curl and libcurl before 7.50.1 do not check the client certificate when choosing the TLS connection to reuse, which might allow remote attackers to hijack the authentication of the connection by leveraging a previously created connection with a different client certificate.
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T01:01:00.390Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2016:2575", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2575.html" }, { "name": "RHSA-2018:3558", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:3558" }, { "name": "92309", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/92309" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://source.android.com/security/bulletin/2016-12-01.html" }, { "name": "SSA:2016-219-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred" ], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.563059" }, { "name": "1036739", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1036739" }, { "name": "DSA-3638", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2016/dsa-3638" }, { "name": "openSUSE-SU-2016:2227", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-09/msg00011.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.tenable.com/security/tns-2016-18" }, { "name": "openSUSE-SU-2016:2379", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-09/msg00094.html" }, { "name": "1036537", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1036537" }, { "name": "FEDORA-2016-24316f1f56", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GLPXQQKURBQFM4XM6645VRPTOE2AWG33/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://curl.haxx.se/docs/adv_20160803B.html" }, { "name": "FEDORA-2016-8354baae0f", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K3GQH4V3XAQ5Z53AMQRDEC3C3UHTW7QR/" }, { "name": "RHSA-2016:2957", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2957.html" }, { "name": "GLSA-201701-47", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201701-47" }, { "name": "USN-3048-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-3048-1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-08-03T00:00:00", "descriptions": [ { "lang": "en", "value": "curl and libcurl before 7.50.1 do not check the client certificate when choosing the TLS connection to reuse, which might allow remote attackers to hijack the authentication of the connection by leveraging a previously created connection with a different client certificate." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-11-13T10:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "RHSA-2016:2575", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2575.html" }, { "name": "RHSA-2018:3558", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:3558" }, { "name": "92309", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/92309" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://source.android.com/security/bulletin/2016-12-01.html" }, { "name": "SSA:2016-219-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE" ], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.563059" }, { "name": "1036739", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1036739" }, { "name": "DSA-3638", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2016/dsa-3638" }, { "name": "openSUSE-SU-2016:2227", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-09/msg00011.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.tenable.com/security/tns-2016-18" }, { "name": "openSUSE-SU-2016:2379", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-09/msg00094.html" }, { "name": "1036537", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1036537" }, { "name": "FEDORA-2016-24316f1f56", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GLPXQQKURBQFM4XM6645VRPTOE2AWG33/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://curl.haxx.se/docs/adv_20160803B.html" }, { "name": "FEDORA-2016-8354baae0f", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K3GQH4V3XAQ5Z53AMQRDEC3C3UHTW7QR/" }, { "name": "RHSA-2016:2957", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2957.html" }, { "name": "GLSA-201701-47", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201701-47" }, { "name": "USN-3048-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-3048-1" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-5420", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "curl and libcurl before 7.50.1 do not check the client certificate when choosing the TLS connection to reuse, which might allow remote attackers to hijack the authentication of the connection by leveraging a previously created connection with a different client certificate." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2016:2575", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-2575.html" }, { "name": "RHSA-2018:3558", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:3558" }, { "name": "92309", "refsource": "BID", "url": "http://www.securityfocus.com/bid/92309" }, { "name": "https://source.android.com/security/bulletin/2016-12-01.html", "refsource": "CONFIRM", "url": "https://source.android.com/security/bulletin/2016-12-01.html" }, { "name": "SSA:2016-219-01", "refsource": "SLACKWARE", "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.563059" }, { "name": "1036739", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1036739" }, { "name": "DSA-3638", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2016/dsa-3638" }, { "name": "openSUSE-SU-2016:2227", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2016-09/msg00011.html" }, { "name": "https://www.tenable.com/security/tns-2016-18", "refsource": "CONFIRM", "url": "https://www.tenable.com/security/tns-2016-18" }, { "name": "openSUSE-SU-2016:2379", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2016-09/msg00094.html" }, { "name": "1036537", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1036537" }, { "name": "FEDORA-2016-24316f1f56", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GLPXQQKURBQFM4XM6645VRPTOE2AWG33/" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "name": "https://curl.haxx.se/docs/adv_20160803B.html", "refsource": "MISC", "url": "https://curl.haxx.se/docs/adv_20160803B.html" }, { "name": "FEDORA-2016-8354baae0f", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K3GQH4V3XAQ5Z53AMQRDEC3C3UHTW7QR/" }, { "name": "RHSA-2016:2957", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-2957.html" }, { "name": "GLSA-201701-47", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201701-47" }, { "name": "USN-3048-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3048-1" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2016-5420", "datePublished": "2016-08-10T14:00:00", "dateReserved": "2016-06-10T00:00:00", "dateUpdated": "2024-08-06T01:01:00.390Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2014-0138 (GCVE-0-2014-0138)
Vulnerability from cvelistv5
Published
2014-04-15 14:00
Modified
2024-08-06 09:05
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The default configuration in cURL and libcurl 7.10.6 before 7.36.0 re-uses (1) SCP, (2) SFTP, (3) POP3, (4) POP3S, (5) IMAP, (6) IMAPS, (7) SMTP, (8) SMTPS, (9) LDAP, and (10) LDAPS connections, which might allow context-dependent attackers to connect as other users via a request, a similar issue to CVE-2014-0015.
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T09:05:38.827Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095862" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://curl.haxx.se/docs/adv_20140326A.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html" }, { "name": "57836", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/57836" }, { "name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded" }, { "name": "DSA-2902", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2014/dsa-2902" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.getchef.com/blog/2014/04/09/chef-server-11-0-12-release/" }, { "name": "59458", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59458" }, { "name": "openSUSE-SU-2014:0530", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-04/msg00042.html" }, { "name": "58615", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/58615" }, { "name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2014/Dec/23" }, { "name": "57968", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/57968" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21675820" }, { "name": "USN-2167-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2167-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.getchef.com/blog/2014/04/09/enterprise-chef-1-4-9-release/" }, { "name": "57966", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/57966" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-03-26T00:00:00", "descriptions": [ { "lang": "en", "value": "The default configuration in cURL and libcurl 7.10.6 before 7.36.0 re-uses (1) SCP, (2) SFTP, (3) POP3, (4) POP3S, (5) IMAP, (6) IMAPS, (7) SMTP, (8) SMTPS, (9) LDAP, and (10) LDAPS connections, which might allow context-dependent attackers to connect as other users via a request, a similar issue to CVE-2014-0015." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095862" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://curl.haxx.se/docs/adv_20140326A.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html" }, { "name": "57836", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/57836" }, { "name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded" }, { "name": "DSA-2902", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2014/dsa-2902" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.getchef.com/blog/2014/04/09/chef-server-11-0-12-release/" }, { "name": "59458", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59458" }, { "name": "openSUSE-SU-2014:0530", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-04/msg00042.html" }, { "name": "58615", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/58615" }, { "name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2014/Dec/23" }, { "name": "57968", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/57968" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21675820" }, { "name": "USN-2167-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2167-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.getchef.com/blog/2014/04/09/enterprise-chef-1-4-9-release/" }, { "name": "57966", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/57966" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-0138", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The default configuration in cURL and libcurl 7.10.6 before 7.36.0 re-uses (1) SCP, (2) SFTP, (3) POP3, (4) POP3S, (5) IMAP, (6) IMAPS, (7) SMTP, (8) SMTPS, (9) LDAP, and (10) LDAPS connections, which might allow context-dependent attackers to connect as other users via a request, a similar issue to CVE-2014-0015." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095862", "refsource": "CONFIRM", "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095862" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "name": "http://curl.haxx.se/docs/adv_20140326A.html", "refsource": "CONFIRM", "url": "http://curl.haxx.se/docs/adv_20140326A.html" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html" }, { "name": "57836", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/57836" }, { "name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded" }, { "name": "DSA-2902", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2014/dsa-2902" }, { "name": "http://www.getchef.com/blog/2014/04/09/chef-server-11-0-12-release/", "refsource": "CONFIRM", "url": "http://www.getchef.com/blog/2014/04/09/chef-server-11-0-12-release/" }, { "name": "59458", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59458" }, { "name": "openSUSE-SU-2014:0530", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2014-04/msg00042.html" }, { "name": "58615", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/58615" }, { "name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2014/Dec/23" }, { "name": "57968", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/57968" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21675820", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21675820" }, { "name": "USN-2167-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2167-1" }, { "name": "http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/", "refsource": "CONFIRM", "url": "http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/" }, { "name": "http://www.getchef.com/blog/2014/04/09/enterprise-chef-1-4-9-release/", "refsource": "CONFIRM", "url": "http://www.getchef.com/blog/2014/04/09/enterprise-chef-1-4-9-release/" }, { "name": "57966", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/57966" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2014-0138", "datePublished": "2014-04-15T14:00:00", "dateReserved": "2013-12-03T00:00:00", "dateUpdated": "2024-08-06T09:05:38.827Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-22876 (GCVE-0-2021-22876)
Vulnerability from cvelistv5
Published
2021-04-01 17:45
Modified
2025-06-09 14:54
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-359 - Privacy Violation ()
Summary
curl 7.1.1 to and including 7.75.0 is vulnerable to an "Exposure of Private Personal Information to an Unauthorized Actor" by leaking credentials in the HTTP Referer: header. libcurl does not strip off user credentials from the URL when automatically populating the Referer: HTTP request header field in outgoing HTTP requests, and therefore risks leaking sensitive data to the server that is the target of the second HTTP request.
References
► | URL | Tags | ||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | https://github.com/curl/curl |
Version: 7.1.1 to and including 7.75.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:51:07.627Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1101882" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://curl.se/docs/CVE-2021-22876.html" }, { "name": "FEDORA-2021-cab5c9befb", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC/" }, { "name": "FEDORA-2021-065371f385", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ/" }, { "name": "FEDORA-2021-26a293c72b", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP/" }, { "name": "[debian-lts-announce] 20210517 [SECURITY] [DLA 2664-1] curl security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00019.html" }, { "name": "GLSA-202105-36", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202105-36" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20210521-0007/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2021-22876", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-06-09T14:54:20.546763Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-09T14:54:59.891Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "https://github.com/curl/curl", "vendor": "n/a", "versions": [ { "status": "affected", "version": "7.1.1 to and including 7.75.0" } ] } ], "descriptions": [ { "lang": "en", "value": "curl 7.1.1 to and including 7.75.0 is vulnerable to an \"Exposure of Private Personal Information to an Unauthorized Actor\" by leaking credentials in the HTTP Referer: header. libcurl does not strip off user credentials from the URL when automatically populating the Referer: HTTP request header field in outgoing HTTP requests, and therefore risks leaking sensitive data to the server that is the target of the second HTTP request." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-359", "description": "Privacy Violation (CWE-359)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-08T14:06:57.000Z", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1101882" }, { "tags": [ "x_refsource_MISC" ], "url": "https://curl.se/docs/CVE-2021-22876.html" }, { "name": "FEDORA-2021-cab5c9befb", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC/" }, { "name": "FEDORA-2021-065371f385", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ/" }, { "name": "FEDORA-2021-26a293c72b", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP/" }, { "name": "[debian-lts-announce] 20210517 [SECURITY] [DLA 2664-1] curl security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00019.html" }, { "name": "GLSA-202105-36", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202105-36" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20210521-0007/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "support@hackerone.com", "ID": "CVE-2021-22876", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "https://github.com/curl/curl", "version": { "version_data": [ { "version_value": "7.1.1 to and including 7.75.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "curl 7.1.1 to and including 7.75.0 is vulnerable to an \"Exposure of Private Personal Information to an Unauthorized Actor\" by leaking credentials in the HTTP Referer: header. libcurl does not strip off user credentials from the URL when automatically populating the Referer: HTTP request header field in outgoing HTTP requests, and therefore risks leaking sensitive data to the server that is the target of the second HTTP request." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Privacy Violation (CWE-359)" } ] } ] }, "references": { "reference_data": [ { "name": "https://hackerone.com/reports/1101882", "refsource": "MISC", "url": "https://hackerone.com/reports/1101882" }, { "name": "https://curl.se/docs/CVE-2021-22876.html", "refsource": "MISC", "url": "https://curl.se/docs/CVE-2021-22876.html" }, { "name": "FEDORA-2021-cab5c9befb", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC/" }, { "name": "FEDORA-2021-065371f385", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ/" }, { "name": "FEDORA-2021-26a293c72b", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP/" }, { "name": "[debian-lts-announce] 20210517 [SECURITY] [DLA 2664-1] curl security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00019.html" }, { "name": "GLSA-202105-36", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202105-36" }, { "name": "https://www.oracle.com//security-alerts/cpujul2021.html", "refsource": "MISC", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "name": "https://security.netapp.com/advisory/ntap-20210521-0007/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210521-0007/" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2021-22876", "datePublished": "2021-04-01T17:45:18.000Z", "dateReserved": "2021-01-06T00:00:00.000Z", "dateUpdated": "2025-06-09T14:54:59.891Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-16890 (GCVE-0-2018-16890)
Vulnerability from cvelistv5
Published
2019-02-06 20:00
Modified
2024-08-05 10:39
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
libcurl versions from 7.36.0 to before 7.64.0 is vulnerable to a heap buffer out-of-bounds read. The function handling incoming NTLM type-2 messages (`lib/vauth/ntlm.c:ntlm_decode_type2_target`) does not validate incoming data correctly and is subject to an integer overflow vulnerability. Using that overflow, a malicious or broken NTLM server could trick libcurl to accept a bad length + offset combination that would lead to a buffer read out-of-bounds.
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
The curl Project | curl |
Version: 7.64.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T10:39:57.668Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "DSA-4386", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2019/dsa-4386" }, { "name": "106947", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/106947" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://curl.haxx.se/docs/CVE-2018-16890.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20190315-0001/" }, { "name": "USN-3882-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3882-1/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16890" }, { "name": "[infra-devnull] 20190404 [GitHub] [incubator-openwhisk-runtime-ballerina] falkzoll commented on issue #15: Update to new base image jdk8u202-b08_openj9-0.12.1.", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f%40%3Cdevnull.infra.apache.org%3E" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-436177.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.f5.com/csp/article/K03314397?utm_source=f5support\u0026amp%3Butm_medium=RSS" }, { "name": "RHSA-2019:3701", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:3701" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "curl", "vendor": "The curl Project", "versions": [ { "status": "affected", "version": "7.64.0" } ] } ], "datePublic": "2019-02-06T00:00:00", "descriptions": [ { "lang": "en", "value": "libcurl versions from 7.36.0 to before 7.64.0 is vulnerable to a heap buffer out-of-bounds read. The function handling incoming NTLM type-2 messages (`lib/vauth/ntlm.c:ntlm_decode_type2_target`) does not validate incoming data correctly and is subject to an integer overflow vulnerability. Using that overflow, a malicious or broken NTLM server could trick libcurl to accept a bad length + offset combination that would lead to a buffer read out-of-bounds." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-11-06T00:07:59", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "DSA-4386", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2019/dsa-4386" }, { "name": "106947", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/106947" }, { "tags": [ "x_refsource_MISC" ], "url": "https://curl.haxx.se/docs/CVE-2018-16890.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20190315-0001/" }, { "name": "USN-3882-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3882-1/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16890" }, { "name": "[infra-devnull] 20190404 [GitHub] [incubator-openwhisk-runtime-ballerina] falkzoll commented on issue #15: Update to new base image jdk8u202-b08_openj9-0.12.1.", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f%40%3Cdevnull.infra.apache.org%3E" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-436177.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.f5.com/csp/article/K03314397?utm_source=f5support\u0026amp%3Butm_medium=RSS" }, { "name": "RHSA-2019:3701", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:3701" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2018-16890", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "curl", "version": { "version_data": [ { "version_value": "7.64.0" } ] } } ] }, "vendor_name": "The curl Project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "libcurl versions from 7.36.0 to before 7.64.0 is vulnerable to a heap buffer out-of-bounds read. The function handling incoming NTLM type-2 messages (`lib/vauth/ntlm.c:ntlm_decode_type2_target`) does not validate incoming data correctly and is subject to an integer overflow vulnerability. Using that overflow, a malicious or broken NTLM server could trick libcurl to accept a bad length + offset combination that would lead to a buffer read out-of-bounds." } ] }, "impact": { "cvss": [ [ { "vectorString": "5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L", "version": "3.0" } ] ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-125" } ] } ] }, "references": { "reference_data": [ { "name": "DSA-4386", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2019/dsa-4386" }, { "name": "106947", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106947" }, { "name": "https://curl.haxx.se/docs/CVE-2018-16890.html", "refsource": "MISC", "url": "https://curl.haxx.se/docs/CVE-2018-16890.html" }, { "name": "https://security.netapp.com/advisory/ntap-20190315-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20190315-0001/" }, { "name": "USN-3882-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3882-1/" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16890", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16890" }, { "name": "[infra-devnull] 20190404 [GitHub] [incubator-openwhisk-runtime-ballerina] falkzoll commented on issue #15: Update to new base image jdk8u202-b08_openj9-0.12.1.", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f@%3Cdevnull.infra.apache.org%3E" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-436177.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-436177.pdf" }, { "name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", "refsource": "MISC", "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "name": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html", "refsource": "MISC", "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html" }, { "name": "https://support.f5.com/csp/article/K03314397?utm_source=f5support\u0026amp;utm_medium=RSS", "refsource": "CONFIRM", "url": "https://support.f5.com/csp/article/K03314397?utm_source=f5support\u0026amp;utm_medium=RSS" }, { "name": "RHSA-2019:3701", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:3701" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2018-16890", "datePublished": "2019-02-06T20:00:00", "dateReserved": "2018-09-11T00:00:00", "dateUpdated": "2024-08-05T10:39:57.668Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-7141 (GCVE-0-2016-7141)
Vulnerability from cvelistv5
Published
2016-10-03 21:00
Modified
2024-08-06 01:50
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
curl and libcurl before 7.50.2, when built with NSS and the libnsspem.so library is available at runtime, allow remote attackers to hijack the authentication of a TLS connection by leveraging reuse of a previously loaded client certificate from file for a connection for which no certificate has been set, a different vulnerability than CVE-2016-5420.
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T01:50:47.499Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2016:2575", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2575.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://curl.haxx.se/docs/adv_20160907.html" }, { "name": "RHSA-2018:3558", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:3558" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1373229" }, { "name": "1036739", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1036739" }, { "name": "[debian-lts-announce] 20181106 [SECURITY] [DLA 1568-1] curl security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/curl/curl/commit/curl-7_50_2~32" }, { "name": "openSUSE-SU-2016:2379", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-09/msg00094.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "name": "RHSA-2016:2957", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2957.html" }, { "name": "92754", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/92754" }, { "name": "GLSA-201701-47", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201701-47" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-09-07T00:00:00", "descriptions": [ { "lang": "en", "value": "curl and libcurl before 7.50.2, when built with NSS and the libnsspem.so library is available at runtime, allow remote attackers to hijack the authentication of a TLS connection by leveraging reuse of a previously loaded client certificate from file for a connection for which no certificate has been set, a different vulnerability than CVE-2016-5420." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-11-13T10:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "RHSA-2016:2575", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2575.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://curl.haxx.se/docs/adv_20160907.html" }, { "name": "RHSA-2018:3558", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:3558" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1373229" }, { "name": "1036739", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1036739" }, { "name": "[debian-lts-announce] 20181106 [SECURITY] [DLA 1568-1] curl security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/curl/curl/commit/curl-7_50_2~32" }, { "name": "openSUSE-SU-2016:2379", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-09/msg00094.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "name": "RHSA-2016:2957", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2957.html" }, { "name": "92754", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/92754" }, { "name": "GLSA-201701-47", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201701-47" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2016-7141", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "curl and libcurl before 7.50.2, when built with NSS and the libnsspem.so library is available at runtime, allow remote attackers to hijack the authentication of a TLS connection by leveraging reuse of a previously loaded client certificate from file for a connection for which no certificate has been set, a different vulnerability than CVE-2016-5420." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2016:2575", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-2575.html" }, { "name": "https://curl.haxx.se/docs/adv_20160907.html", "refsource": "CONFIRM", "url": "https://curl.haxx.se/docs/adv_20160907.html" }, { "name": "RHSA-2018:3558", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:3558" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1373229", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1373229" }, { "name": "1036739", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1036739" }, { "name": "[debian-lts-announce] 20181106 [SECURITY] [DLA 1568-1] curl security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html" }, { "name": "https://github.com/curl/curl/commit/curl-7_50_2~32", "refsource": "CONFIRM", "url": "https://github.com/curl/curl/commit/curl-7_50_2~32" }, { "name": "openSUSE-SU-2016:2379", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2016-09/msg00094.html" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "name": "RHSA-2016:2957", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-2957.html" }, { "name": "92754", "refsource": "BID", "url": "http://www.securityfocus.com/bid/92754" }, { "name": "GLSA-201701-47", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201701-47" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2016-7141", "datePublished": "2016-10-03T21:00:00", "dateReserved": "2016-09-05T00:00:00", "dateUpdated": "2024-08-06T01:50:47.499Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-27538 (GCVE-0-2023-27538)
Vulnerability from cvelistv5
Published
2023-03-30 00:00
Modified
2025-06-09 14:52
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-305 - Authentication Bypass by Primary Weakness ()
Summary
An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | https://github.com/curl/curl |
Version: Fixed in 8.0.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T12:16:35.616Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://hackerone.com/reports/1898475" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20230420-0010/" }, { "name": "[debian-lts-announce] 20230421 [SECURITY] [DLA 3398-1] curl security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html" }, { "name": "GLSA-202310-12", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202310-12" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-27538", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-06-09T14:52:04.392274Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-09T14:52:08.739Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "https://github.com/curl/curl", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Fixed in 8.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-305", "description": "Authentication Bypass by Primary Weakness (CWE-305)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-11T10:06:34.473Z", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "url": "https://hackerone.com/reports/1898475" }, { "url": "https://security.netapp.com/advisory/ntap-20230420-0010/" }, { "name": "[debian-lts-announce] 20230421 [SECURITY] [DLA 3398-1] curl security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html" }, { "name": "GLSA-202310-12", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202310-12" } ] } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2023-27538", "datePublished": "2023-03-30T00:00:00.000Z", "dateReserved": "2023-03-02T00:00:00.000Z", "dateUpdated": "2025-06-09T14:52:08.739Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-7264 (GCVE-0-2024-7264)
Vulnerability from cvelistv5
Published
2024-07-31 08:08
Modified
2025-02-13 17:58
Severity ?
VLAI Severity ?
EPSS score ?
Summary
libcurl's ASN1 parser code has the `GTime2str()` function, used for parsing an
ASN.1 Generalized Time field. If given an syntactically incorrect field, the
parser might end up using -1 for the length of the *time fraction*, leading to
a `strlen()` getting performed on a pointer to a heap buffer area that is not
(purposely) null terminated.
This flaw most likely leads to a crash, but can also lead to heap contents
getting returned to the application when
[CURLINFO_CERTINFO](https://curl.se/libcurl/c/CURLINFO_CERTINFO.html) is used.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
curl | curl |
Version: 8.9.0 ≤ 8.9.0 Version: 8.8.0 ≤ 8.8.0 Version: 8.7.1 ≤ 8.7.1 Version: 8.7.0 ≤ 8.7.0 Version: 8.6.0 ≤ 8.6.0 Version: 8.5.0 ≤ 8.5.0 Version: 8.4.0 ≤ 8.4.0 Version: 8.3.0 ≤ 8.3.0 Version: 8.2.1 ≤ 8.2.1 Version: 8.2.0 ≤ 8.2.0 Version: 8.1.2 ≤ 8.1.2 Version: 8.1.1 ≤ 8.1.1 Version: 8.1.0 ≤ 8.1.0 Version: 8.0.1 ≤ 8.0.1 Version: 8.0.0 ≤ 8.0.0 Version: 7.88.1 ≤ 7.88.1 Version: 7.88.0 ≤ 7.88.0 Version: 7.87.0 ≤ 7.87.0 Version: 7.86.0 ≤ 7.86.0 Version: 7.85.0 ≤ 7.85.0 Version: 7.84.0 ≤ 7.84.0 Version: 7.83.1 ≤ 7.83.1 Version: 7.83.0 ≤ 7.83.0 Version: 7.82.0 ≤ 7.82.0 Version: 7.81.0 ≤ 7.81.0 Version: 7.80.0 ≤ 7.80.0 Version: 7.79.1 ≤ 7.79.1 Version: 7.79.0 ≤ 7.79.0 Version: 7.78.0 ≤ 7.78.0 Version: 7.77.0 ≤ 7.77.0 Version: 7.76.1 ≤ 7.76.1 Version: 7.76.0 ≤ 7.76.0 Version: 7.75.0 ≤ 7.75.0 Version: 7.74.0 ≤ 7.74.0 Version: 7.73.0 ≤ 7.73.0 Version: 7.72.0 ≤ 7.72.0 Version: 7.71.1 ≤ 7.71.1 Version: 7.71.0 ≤ 7.71.0 Version: 7.70.0 ≤ 7.70.0 Version: 7.69.1 ≤ 7.69.1 Version: 7.69.0 ≤ 7.69.0 Version: 7.68.0 ≤ 7.68.0 Version: 7.67.0 ≤ 7.67.0 Version: 7.66.0 ≤ 7.66.0 Version: 7.65.3 ≤ 7.65.3 Version: 7.65.2 ≤ 7.65.2 Version: 7.65.1 ≤ 7.65.1 Version: 7.65.0 ≤ 7.65.0 Version: 7.64.1 ≤ 7.64.1 Version: 7.64.0 ≤ 7.64.0 Version: 7.63.0 ≤ 7.63.0 Version: 7.62.0 ≤ 7.62.0 Version: 7.61.1 ≤ 7.61.1 Version: 7.61.0 ≤ 7.61.0 Version: 7.60.0 ≤ 7.60.0 Version: 7.59.0 ≤ 7.59.0 Version: 7.58.0 ≤ 7.58.0 Version: 7.57.0 ≤ 7.57.0 Version: 7.56.1 ≤ 7.56.1 Version: 7.56.0 ≤ 7.56.0 Version: 7.55.1 ≤ 7.55.1 Version: 7.55.0 ≤ 7.55.0 Version: 7.54.1 ≤ 7.54.1 Version: 7.54.0 ≤ 7.54.0 Version: 7.53.1 ≤ 7.53.1 Version: 7.53.0 ≤ 7.53.0 Version: 7.52.1 ≤ 7.52.1 Version: 7.52.0 ≤ 7.52.0 Version: 7.51.0 ≤ 7.51.0 Version: 7.50.3 ≤ 7.50.3 Version: 7.50.2 ≤ 7.50.2 Version: 7.50.1 ≤ 7.50.1 Version: 7.50.0 ≤ 7.50.0 Version: 7.49.1 ≤ 7.49.1 Version: 7.49.0 ≤ 7.49.0 Version: 7.48.0 ≤ 7.48.0 Version: 7.47.1 ≤ 7.47.1 Version: 7.47.0 ≤ 7.47.0 Version: 7.46.0 ≤ 7.46.0 Version: 7.45.0 ≤ 7.45.0 Version: 7.44.0 ≤ 7.44.0 Version: 7.43.0 ≤ 7.43.0 Version: 7.42.1 ≤ 7.42.1 Version: 7.42.0 ≤ 7.42.0 Version: 7.41.0 ≤ 7.41.0 Version: 7.40.0 ≤ 7.40.0 Version: 7.39.0 ≤ 7.39.0 Version: 7.38.0 ≤ 7.38.0 Version: 7.37.1 ≤ 7.37.1 Version: 7.37.0 ≤ 7.37.0 Version: 7.36.0 ≤ 7.36.0 Version: 7.35.0 ≤ 7.35.0 Version: 7.34.0 ≤ 7.34.0 Version: 7.33.0 ≤ 7.33.0 Version: 7.32.0 ≤ 7.32.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-28T15:02:52.325Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "url": "https://github.com/curl/curl/commit/27959ecce75cdb2809c0bdb3286e60e08fadb519" }, { "tags": [ "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2024/07/31/1" }, { "url": "https://security.netapp.com/advisory/ntap-20240828-0008/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-7264", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-01T20:05:41.315706Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-30T19:41:40.489Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "curl", "vendor": "curl", "versions": [ { "lessThanOrEqual": "8.9.0", "status": "affected", "version": "8.9.0", "versionType": "semver" }, { "lessThanOrEqual": "8.8.0", "status": "affected", "version": "8.8.0", "versionType": "semver" }, { "lessThanOrEqual": "8.7.1", "status": "affected", "version": "8.7.1", "versionType": "semver" }, { "lessThanOrEqual": "8.7.0", "status": "affected", "version": "8.7.0", "versionType": "semver" }, { "lessThanOrEqual": "8.6.0", "status": "affected", "version": "8.6.0", "versionType": "semver" }, { "lessThanOrEqual": "8.5.0", "status": "affected", "version": "8.5.0", "versionType": "semver" }, { "lessThanOrEqual": "8.4.0", "status": "affected", "version": "8.4.0", "versionType": "semver" }, { "lessThanOrEqual": "8.3.0", "status": "affected", "version": "8.3.0", "versionType": "semver" }, { "lessThanOrEqual": "8.2.1", "status": "affected", "version": "8.2.1", "versionType": "semver" }, { "lessThanOrEqual": "8.2.0", "status": "affected", "version": "8.2.0", "versionType": "semver" }, { "lessThanOrEqual": "8.1.2", "status": "affected", "version": "8.1.2", "versionType": "semver" }, { "lessThanOrEqual": "8.1.1", "status": "affected", "version": "8.1.1", "versionType": "semver" }, { "lessThanOrEqual": "8.1.0", "status": "affected", "version": "8.1.0", "versionType": "semver" }, { "lessThanOrEqual": "8.0.1", "status": "affected", "version": "8.0.1", "versionType": "semver" }, { "lessThanOrEqual": "8.0.0", "status": "affected", "version": "8.0.0", "versionType": "semver" }, { "lessThanOrEqual": "7.88.1", "status": "affected", "version": "7.88.1", "versionType": "semver" }, { "lessThanOrEqual": "7.88.0", "status": "affected", "version": "7.88.0", "versionType": "semver" }, { "lessThanOrEqual": "7.87.0", "status": "affected", "version": "7.87.0", "versionType": "semver" }, { "lessThanOrEqual": "7.86.0", "status": "affected", "version": "7.86.0", "versionType": "semver" }, { "lessThanOrEqual": "7.85.0", "status": "affected", "version": "7.85.0", "versionType": "semver" }, { "lessThanOrEqual": "7.84.0", "status": "affected", "version": "7.84.0", "versionType": "semver" }, { "lessThanOrEqual": "7.83.1", "status": "affected", "version": "7.83.1", "versionType": "semver" }, { "lessThanOrEqual": "7.83.0", "status": "affected", "version": "7.83.0", "versionType": "semver" }, { "lessThanOrEqual": "7.82.0", "status": "affected", "version": "7.82.0", "versionType": "semver" }, { "lessThanOrEqual": "7.81.0", "status": "affected", "version": "7.81.0", "versionType": "semver" }, { "lessThanOrEqual": "7.80.0", "status": "affected", "version": "7.80.0", "versionType": "semver" }, { "lessThanOrEqual": "7.79.1", "status": "affected", "version": "7.79.1", "versionType": "semver" }, { "lessThanOrEqual": "7.79.0", "status": "affected", "version": "7.79.0", "versionType": "semver" }, { "lessThanOrEqual": "7.78.0", "status": "affected", "version": "7.78.0", "versionType": "semver" }, { "lessThanOrEqual": "7.77.0", "status": "affected", "version": "7.77.0", "versionType": "semver" }, { "lessThanOrEqual": "7.76.1", "status": "affected", "version": "7.76.1", "versionType": "semver" }, { "lessThanOrEqual": "7.76.0", "status": "affected", "version": "7.76.0", "versionType": "semver" }, { "lessThanOrEqual": "7.75.0", "status": "affected", "version": "7.75.0", "versionType": "semver" }, { "lessThanOrEqual": "7.74.0", "status": "affected", "version": "7.74.0", "versionType": "semver" }, { "lessThanOrEqual": "7.73.0", "status": "affected", "version": "7.73.0", "versionType": "semver" }, { "lessThanOrEqual": "7.72.0", "status": "affected", "version": "7.72.0", "versionType": "semver" }, { "lessThanOrEqual": "7.71.1", "status": "affected", "version": "7.71.1", "versionType": "semver" }, { "lessThanOrEqual": "7.71.0", "status": "affected", "version": "7.71.0", "versionType": "semver" }, { "lessThanOrEqual": "7.70.0", "status": "affected", "version": "7.70.0", "versionType": "semver" }, { "lessThanOrEqual": "7.69.1", "status": "affected", "version": "7.69.1", "versionType": "semver" }, { "lessThanOrEqual": "7.69.0", "status": "affected", "version": "7.69.0", "versionType": "semver" }, { "lessThanOrEqual": "7.68.0", "status": "affected", "version": "7.68.0", "versionType": "semver" }, { "lessThanOrEqual": "7.67.0", "status": "affected", "version": "7.67.0", "versionType": "semver" }, { "lessThanOrEqual": "7.66.0", "status": "affected", "version": "7.66.0", "versionType": "semver" }, { "lessThanOrEqual": "7.65.3", "status": "affected", "version": "7.65.3", "versionType": "semver" }, { "lessThanOrEqual": "7.65.2", "status": "affected", "version": "7.65.2", "versionType": "semver" }, { "lessThanOrEqual": "7.65.1", "status": "affected", "version": "7.65.1", "versionType": "semver" }, { "lessThanOrEqual": "7.65.0", "status": "affected", "version": "7.65.0", "versionType": "semver" }, { "lessThanOrEqual": "7.64.1", "status": "affected", "version": "7.64.1", "versionType": "semver" }, { "lessThanOrEqual": "7.64.0", "status": "affected", "version": "7.64.0", "versionType": "semver" }, { "lessThanOrEqual": "7.63.0", "status": "affected", "version": "7.63.0", "versionType": "semver" }, { "lessThanOrEqual": "7.62.0", "status": "affected", "version": "7.62.0", "versionType": "semver" }, { "lessThanOrEqual": "7.61.1", "status": "affected", "version": "7.61.1", "versionType": "semver" }, { "lessThanOrEqual": "7.61.0", "status": "affected", "version": "7.61.0", "versionType": "semver" }, { "lessThanOrEqual": "7.60.0", "status": "affected", "version": "7.60.0", "versionType": "semver" }, { "lessThanOrEqual": "7.59.0", "status": "affected", "version": "7.59.0", "versionType": "semver" }, { "lessThanOrEqual": "7.58.0", "status": "affected", "version": "7.58.0", "versionType": "semver" }, { "lessThanOrEqual": "7.57.0", "status": "affected", "version": "7.57.0", "versionType": "semver" }, { "lessThanOrEqual": "7.56.1", "status": "affected", "version": "7.56.1", "versionType": "semver" }, { "lessThanOrEqual": "7.56.0", "status": "affected", "version": "7.56.0", "versionType": "semver" }, { "lessThanOrEqual": "7.55.1", "status": "affected", "version": "7.55.1", "versionType": "semver" }, { "lessThanOrEqual": "7.55.0", "status": "affected", "version": "7.55.0", "versionType": "semver" }, { "lessThanOrEqual": "7.54.1", "status": "affected", "version": "7.54.1", "versionType": "semver" }, { "lessThanOrEqual": "7.54.0", "status": "affected", "version": "7.54.0", "versionType": "semver" }, { "lessThanOrEqual": "7.53.1", "status": "affected", "version": "7.53.1", "versionType": "semver" }, { "lessThanOrEqual": "7.53.0", "status": "affected", "version": "7.53.0", "versionType": "semver" }, { "lessThanOrEqual": "7.52.1", "status": "affected", "version": "7.52.1", "versionType": "semver" }, { "lessThanOrEqual": "7.52.0", "status": "affected", "version": "7.52.0", "versionType": "semver" }, { "lessThanOrEqual": "7.51.0", "status": "affected", "version": "7.51.0", "versionType": "semver" }, { "lessThanOrEqual": "7.50.3", "status": "affected", "version": "7.50.3", "versionType": "semver" }, { "lessThanOrEqual": "7.50.2", "status": "affected", "version": "7.50.2", "versionType": "semver" }, { "lessThanOrEqual": "7.50.1", "status": "affected", "version": "7.50.1", "versionType": "semver" }, { "lessThanOrEqual": "7.50.0", "status": "affected", "version": "7.50.0", "versionType": "semver" }, { "lessThanOrEqual": "7.49.1", "status": "affected", "version": "7.49.1", "versionType": "semver" }, { "lessThanOrEqual": "7.49.0", "status": "affected", "version": "7.49.0", "versionType": "semver" }, { "lessThanOrEqual": "7.48.0", "status": "affected", "version": "7.48.0", "versionType": "semver" }, { "lessThanOrEqual": "7.47.1", "status": "affected", "version": "7.47.1", "versionType": "semver" }, { "lessThanOrEqual": "7.47.0", "status": "affected", "version": "7.47.0", "versionType": "semver" }, { "lessThanOrEqual": "7.46.0", "status": "affected", "version": "7.46.0", "versionType": "semver" }, { "lessThanOrEqual": "7.45.0", "status": "affected", "version": "7.45.0", "versionType": "semver" }, { "lessThanOrEqual": "7.44.0", "status": "affected", "version": "7.44.0", "versionType": "semver" }, { "lessThanOrEqual": "7.43.0", "status": "affected", "version": "7.43.0", "versionType": "semver" }, { "lessThanOrEqual": "7.42.1", "status": "affected", "version": "7.42.1", "versionType": "semver" }, { "lessThanOrEqual": "7.42.0", "status": "affected", "version": "7.42.0", "versionType": "semver" }, { "lessThanOrEqual": "7.41.0", "status": "affected", "version": "7.41.0", "versionType": "semver" }, { "lessThanOrEqual": "7.40.0", "status": "affected", "version": "7.40.0", "versionType": "semver" }, { "lessThanOrEqual": "7.39.0", "status": "affected", "version": "7.39.0", "versionType": "semver" }, { "lessThanOrEqual": "7.38.0", "status": "affected", "version": "7.38.0", "versionType": "semver" }, { "lessThanOrEqual": "7.37.1", "status": "affected", "version": "7.37.1", "versionType": "semver" }, { "lessThanOrEqual": "7.37.0", "status": "affected", "version": "7.37.0", "versionType": "semver" }, { "lessThanOrEqual": "7.36.0", "status": "affected", "version": "7.36.0", "versionType": "semver" }, { "lessThanOrEqual": "7.35.0", "status": "affected", "version": "7.35.0", "versionType": "semver" }, { "lessThanOrEqual": "7.34.0", "status": "affected", "version": "7.34.0", "versionType": "semver" }, { "lessThanOrEqual": "7.33.0", "status": "affected", "version": "7.33.0", "versionType": "semver" }, { "lessThanOrEqual": "7.32.0", "status": "affected", "version": "7.32.0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Dov Murik (Transmit Security)" }, { "lang": "en", "type": "remediation developer", "value": "Stefan Eissing" } ], "descriptions": [ { "lang": "en", "value": "libcurl\u0027s ASN1 parser code has the `GTime2str()` function, used for parsing an\nASN.1 Generalized Time field. If given an syntactically incorrect field, the\nparser might end up using -1 for the length of the *time fraction*, leading to\na `strlen()` getting performed on a pointer to a heap buffer area that is not\n(purposely) null terminated.\n\nThis flaw most likely leads to a crash, but can also lead to heap contents\ngetting returned to the application when\n[CURLINFO_CERTINFO](https://curl.se/libcurl/c/CURLINFO_CERTINFO.html) is used." } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-125 Out-of-bounds Read", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-31T08:10:08.639Z", "orgId": "2499f714-1537-4658-8207-48ae4bb9eae9", "shortName": "curl" }, "references": [ { "name": "json", "url": "https://curl.se/docs/CVE-2024-7264.json" }, { "name": "www", "url": "https://curl.se/docs/CVE-2024-7264.html" }, { "name": "issue", "url": "https://hackerone.com/reports/2629968" }, { "url": "http://www.openwall.com/lists/oss-security/2024/07/31/1" } ], "title": "ASN.1 date parser overread" } }, "cveMetadata": { "assignerOrgId": "2499f714-1537-4658-8207-48ae4bb9eae9", "assignerShortName": "curl", "cveId": "CVE-2024-7264", "datePublished": "2024-07-31T08:08:14.585Z", "dateReserved": "2024-07-30T08:04:22.389Z", "dateUpdated": "2025-02-13T17:58:03.375Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-0725 (GCVE-0-2025-0725)
Vulnerability from cvelistv5
Published
2025-02-05 09:18
Modified
2025-06-12 16:04
Severity ?
VLAI Severity ?
EPSS score ?
Summary
When libcurl is asked to perform automatic gzip decompression of
content-encoded HTTP responses with the `CURLOPT_ACCEPT_ENCODING` option,
**using zlib 1.2.0.3 or older**, an attacker-controlled integer overflow would
make libcurl perform a buffer overflow.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
curl | curl |
Version: 8.11.1 ≤ 8.11.1 Version: 8.11.0 ≤ 8.11.0 Version: 8.10.1 ≤ 8.10.1 Version: 8.10.0 ≤ 8.10.0 Version: 8.9.1 ≤ 8.9.1 Version: 8.9.0 ≤ 8.9.0 Version: 8.8.0 ≤ 8.8.0 Version: 8.7.1 ≤ 8.7.1 Version: 8.7.0 ≤ 8.7.0 Version: 8.6.0 ≤ 8.6.0 Version: 8.5.0 ≤ 8.5.0 Version: 8.4.0 ≤ 8.4.0 Version: 8.3.0 ≤ 8.3.0 Version: 8.2.1 ≤ 8.2.1 Version: 8.2.0 ≤ 8.2.0 Version: 8.1.2 ≤ 8.1.2 Version: 8.1.1 ≤ 8.1.1 Version: 8.1.0 ≤ 8.1.0 Version: 8.0.1 ≤ 8.0.1 Version: 8.0.0 ≤ 8.0.0 Version: 7.88.1 ≤ 7.88.1 Version: 7.88.0 ≤ 7.88.0 Version: 7.87.0 ≤ 7.87.0 Version: 7.86.0 ≤ 7.86.0 Version: 7.85.0 ≤ 7.85.0 Version: 7.84.0 ≤ 7.84.0 Version: 7.83.1 ≤ 7.83.1 Version: 7.83.0 ≤ 7.83.0 Version: 7.82.0 ≤ 7.82.0 Version: 7.81.0 ≤ 7.81.0 Version: 7.80.0 ≤ 7.80.0 Version: 7.79.1 ≤ 7.79.1 Version: 7.79.0 ≤ 7.79.0 Version: 7.78.0 ≤ 7.78.0 Version: 7.77.0 ≤ 7.77.0 Version: 7.76.1 ≤ 7.76.1 Version: 7.76.0 ≤ 7.76.0 Version: 7.75.0 ≤ 7.75.0 Version: 7.74.0 ≤ 7.74.0 Version: 7.73.0 ≤ 7.73.0 Version: 7.72.0 ≤ 7.72.0 Version: 7.71.1 ≤ 7.71.1 Version: 7.71.0 ≤ 7.71.0 Version: 7.70.0 ≤ 7.70.0 Version: 7.69.1 ≤ 7.69.1 Version: 7.69.0 ≤ 7.69.0 Version: 7.68.0 ≤ 7.68.0 Version: 7.67.0 ≤ 7.67.0 Version: 7.66.0 ≤ 7.66.0 Version: 7.65.3 ≤ 7.65.3 Version: 7.65.2 ≤ 7.65.2 Version: 7.65.1 ≤ 7.65.1 Version: 7.65.0 ≤ 7.65.0 Version: 7.64.1 ≤ 7.64.1 Version: 7.64.0 ≤ 7.64.0 Version: 7.63.0 ≤ 7.63.0 Version: 7.62.0 ≤ 7.62.0 Version: 7.61.1 ≤ 7.61.1 Version: 7.61.0 ≤ 7.61.0 Version: 7.60.0 ≤ 7.60.0 Version: 7.59.0 ≤ 7.59.0 Version: 7.58.0 ≤ 7.58.0 Version: 7.57.0 ≤ 7.57.0 Version: 7.56.1 ≤ 7.56.1 Version: 7.56.0 ≤ 7.56.0 Version: 7.55.1 ≤ 7.55.1 Version: 7.55.0 ≤ 7.55.0 Version: 7.54.1 ≤ 7.54.1 Version: 7.54.0 ≤ 7.54.0 Version: 7.53.1 ≤ 7.53.1 Version: 7.53.0 ≤ 7.53.0 Version: 7.52.1 ≤ 7.52.1 Version: 7.52.0 ≤ 7.52.0 Version: 7.51.0 ≤ 7.51.0 Version: 7.50.3 ≤ 7.50.3 Version: 7.50.2 ≤ 7.50.2 Version: 7.50.1 ≤ 7.50.1 Version: 7.50.0 ≤ 7.50.0 Version: 7.49.1 ≤ 7.49.1 Version: 7.49.0 ≤ 7.49.0 Version: 7.48.0 ≤ 7.48.0 Version: 7.47.1 ≤ 7.47.1 Version: 7.47.0 ≤ 7.47.0 Version: 7.46.0 ≤ 7.46.0 Version: 7.45.0 ≤ 7.45.0 Version: 7.44.0 ≤ 7.44.0 Version: 7.43.0 ≤ 7.43.0 Version: 7.42.1 ≤ 7.42.1 Version: 7.42.0 ≤ 7.42.0 Version: 7.41.0 ≤ 7.41.0 Version: 7.40.0 ≤ 7.40.0 Version: 7.39.0 ≤ 7.39.0 Version: 7.38.0 ≤ 7.38.0 Version: 7.37.1 ≤ 7.37.1 Version: 7.37.0 ≤ 7.37.0 Version: 7.36.0 ≤ 7.36.0 Version: 7.35.0 ≤ 7.35.0 Version: 7.34.0 ≤ 7.34.0 Version: 7.33.0 ≤ 7.33.0 Version: 7.32.0 ≤ 7.32.0 Version: 7.31.0 ≤ 7.31.0 Version: 7.30.0 ≤ 7.30.0 Version: 7.29.0 ≤ 7.29.0 Version: 7.28.1 ≤ 7.28.1 Version: 7.28.0 ≤ 7.28.0 Version: 7.27.0 ≤ 7.27.0 Version: 7.26.0 ≤ 7.26.0 Version: 7.25.0 ≤ 7.25.0 Version: 7.24.0 ≤ 7.24.0 Version: 7.23.1 ≤ 7.23.1 Version: 7.23.0 ≤ 7.23.0 Version: 7.22.0 ≤ 7.22.0 Version: 7.21.7 ≤ 7.21.7 Version: 7.21.6 ≤ 7.21.6 Version: 7.21.5 ≤ 7.21.5 Version: 7.21.4 ≤ 7.21.4 Version: 7.21.3 ≤ 7.21.3 Version: 7.21.2 ≤ 7.21.2 Version: 7.21.1 ≤ 7.21.1 Version: 7.21.0 ≤ 7.21.0 Version: 7.20.1 ≤ 7.20.1 Version: 7.20.0 ≤ 7.20.0 Version: 7.19.7 ≤ 7.19.7 Version: 7.19.6 ≤ 7.19.6 Version: 7.19.5 ≤ 7.19.5 Version: 7.19.4 ≤ 7.19.4 Version: 7.19.3 ≤ 7.19.3 Version: 7.19.2 ≤ 7.19.2 Version: 7.19.1 ≤ 7.19.1 Version: 7.19.0 ≤ 7.19.0 Version: 7.18.2 ≤ 7.18.2 Version: 7.18.1 ≤ 7.18.1 Version: 7.18.0 ≤ 7.18.0 Version: 7.17.1 ≤ 7.17.1 Version: 7.17.0 ≤ 7.17.0 Version: 7.16.4 ≤ 7.16.4 Version: 7.16.3 ≤ 7.16.3 Version: 7.16.2 ≤ 7.16.2 Version: 7.16.1 ≤ 7.16.1 Version: 7.16.0 ≤ 7.16.0 Version: 7.15.5 ≤ 7.15.5 Version: 7.15.4 ≤ 7.15.4 Version: 7.15.3 ≤ 7.15.3 Version: 7.15.2 ≤ 7.15.2 Version: 7.15.1 ≤ 7.15.1 Version: 7.15.0 ≤ 7.15.0 Version: 7.14.1 ≤ 7.14.1 Version: 7.14.0 ≤ 7.14.0 Version: 7.13.2 ≤ 7.13.2 Version: 7.13.1 ≤ 7.13.1 Version: 7.13.0 ≤ 7.13.0 Version: 7.12.3 ≤ 7.12.3 Version: 7.12.2 ≤ 7.12.2 Version: 7.12.1 ≤ 7.12.1 Version: 7.12.0 ≤ 7.12.0 Version: 7.11.2 ≤ 7.11.2 Version: 7.11.1 ≤ 7.11.1 Version: 7.11.0 ≤ 7.11.0 Version: 7.10.8 ≤ 7.10.8 Version: 7.10.7 ≤ 7.10.7 Version: 7.10.6 ≤ 7.10.6 Version: 7.10.5 ≤ 7.10.5 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2025-06-12T16:04:29.956Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "url": "http://www.openwall.com/lists/oss-security/2025/02/05/3" }, { "url": "http://www.openwall.com/lists/oss-security/2025/02/06/2" }, { "url": "http://www.openwall.com/lists/oss-security/2025/02/06/4" }, { "url": "https://security.netapp.com/advisory/ntap-20250306-0009/" }, { "url": "https://github.com/curl/curl/commit/76f83f0db23846e254d940ec7" } ], "title": "CVE Program Container", "x_generator": { "engine": "ADPogram 0.0.1" } }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2025-0725", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-05T14:33:50.737849Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-05T14:34:15.390Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "curl", "vendor": "curl", "versions": [ { "lessThanOrEqual": "8.11.1", "status": "affected", "version": "8.11.1", "versionType": "semver" }, { "lessThanOrEqual": "8.11.0", "status": "affected", "version": "8.11.0", "versionType": "semver" }, { "lessThanOrEqual": "8.10.1", "status": "affected", "version": "8.10.1", "versionType": "semver" }, { "lessThanOrEqual": "8.10.0", "status": "affected", "version": "8.10.0", "versionType": "semver" }, { "lessThanOrEqual": "8.9.1", "status": "affected", "version": "8.9.1", "versionType": "semver" }, { "lessThanOrEqual": "8.9.0", "status": "affected", "version": "8.9.0", "versionType": "semver" }, { "lessThanOrEqual": "8.8.0", "status": "affected", "version": "8.8.0", "versionType": "semver" }, { "lessThanOrEqual": "8.7.1", "status": "affected", "version": "8.7.1", "versionType": "semver" }, { "lessThanOrEqual": "8.7.0", "status": "affected", "version": "8.7.0", "versionType": "semver" }, { "lessThanOrEqual": "8.6.0", "status": "affected", "version": "8.6.0", "versionType": "semver" }, { "lessThanOrEqual": "8.5.0", "status": "affected", "version": "8.5.0", "versionType": "semver" }, { "lessThanOrEqual": "8.4.0", "status": "affected", "version": "8.4.0", "versionType": "semver" }, { "lessThanOrEqual": "8.3.0", "status": "affected", "version": "8.3.0", "versionType": "semver" }, { "lessThanOrEqual": "8.2.1", "status": "affected", "version": "8.2.1", "versionType": "semver" }, { "lessThanOrEqual": "8.2.0", "status": "affected", "version": "8.2.0", "versionType": "semver" }, { "lessThanOrEqual": "8.1.2", "status": "affected", "version": "8.1.2", "versionType": "semver" }, { "lessThanOrEqual": "8.1.1", "status": "affected", "version": "8.1.1", "versionType": "semver" }, { "lessThanOrEqual": "8.1.0", "status": "affected", "version": "8.1.0", "versionType": "semver" }, { "lessThanOrEqual": "8.0.1", "status": "affected", "version": "8.0.1", "versionType": "semver" }, { "lessThanOrEqual": "8.0.0", "status": "affected", "version": "8.0.0", "versionType": "semver" }, { "lessThanOrEqual": "7.88.1", "status": "affected", "version": "7.88.1", "versionType": "semver" }, { "lessThanOrEqual": "7.88.0", "status": "affected", "version": "7.88.0", "versionType": "semver" }, { "lessThanOrEqual": "7.87.0", "status": "affected", "version": "7.87.0", "versionType": "semver" }, { "lessThanOrEqual": "7.86.0", "status": "affected", "version": "7.86.0", "versionType": "semver" }, { "lessThanOrEqual": "7.85.0", "status": "affected", "version": "7.85.0", "versionType": "semver" }, { "lessThanOrEqual": "7.84.0", "status": "affected", "version": "7.84.0", "versionType": "semver" }, { "lessThanOrEqual": "7.83.1", "status": "affected", "version": "7.83.1", "versionType": "semver" }, { "lessThanOrEqual": "7.83.0", "status": "affected", "version": "7.83.0", "versionType": "semver" }, { "lessThanOrEqual": "7.82.0", "status": "affected", "version": "7.82.0", "versionType": "semver" }, { "lessThanOrEqual": "7.81.0", "status": "affected", "version": "7.81.0", "versionType": "semver" }, { "lessThanOrEqual": "7.80.0", "status": "affected", "version": "7.80.0", "versionType": "semver" }, { "lessThanOrEqual": "7.79.1", "status": "affected", "version": "7.79.1", "versionType": "semver" }, { "lessThanOrEqual": "7.79.0", "status": "affected", "version": "7.79.0", "versionType": "semver" }, { "lessThanOrEqual": "7.78.0", "status": "affected", "version": "7.78.0", "versionType": "semver" }, { "lessThanOrEqual": "7.77.0", "status": "affected", "version": "7.77.0", "versionType": "semver" }, { "lessThanOrEqual": "7.76.1", "status": "affected", "version": "7.76.1", "versionType": "semver" }, { "lessThanOrEqual": "7.76.0", "status": "affected", "version": "7.76.0", "versionType": "semver" }, { "lessThanOrEqual": "7.75.0", "status": "affected", "version": "7.75.0", "versionType": "semver" }, { "lessThanOrEqual": "7.74.0", "status": "affected", "version": "7.74.0", "versionType": "semver" }, { "lessThanOrEqual": "7.73.0", "status": "affected", "version": "7.73.0", "versionType": "semver" }, { "lessThanOrEqual": "7.72.0", "status": "affected", "version": "7.72.0", "versionType": "semver" }, { "lessThanOrEqual": "7.71.1", "status": "affected", "version": "7.71.1", "versionType": "semver" }, { "lessThanOrEqual": "7.71.0", "status": "affected", "version": "7.71.0", "versionType": "semver" }, { "lessThanOrEqual": "7.70.0", "status": "affected", "version": "7.70.0", "versionType": "semver" }, { "lessThanOrEqual": "7.69.1", "status": "affected", "version": "7.69.1", "versionType": "semver" }, { "lessThanOrEqual": "7.69.0", "status": "affected", "version": "7.69.0", "versionType": "semver" }, { "lessThanOrEqual": "7.68.0", "status": "affected", "version": "7.68.0", "versionType": "semver" }, { "lessThanOrEqual": "7.67.0", "status": "affected", "version": "7.67.0", "versionType": "semver" }, { "lessThanOrEqual": "7.66.0", "status": "affected", "version": "7.66.0", "versionType": "semver" }, { "lessThanOrEqual": "7.65.3", "status": "affected", "version": "7.65.3", "versionType": "semver" }, { "lessThanOrEqual": "7.65.2", "status": "affected", "version": "7.65.2", "versionType": "semver" }, { "lessThanOrEqual": "7.65.1", "status": "affected", "version": "7.65.1", "versionType": "semver" }, { "lessThanOrEqual": "7.65.0", "status": "affected", "version": "7.65.0", "versionType": "semver" }, { "lessThanOrEqual": "7.64.1", "status": "affected", "version": "7.64.1", "versionType": "semver" }, { "lessThanOrEqual": "7.64.0", "status": "affected", "version": "7.64.0", "versionType": "semver" }, { "lessThanOrEqual": "7.63.0", "status": "affected", "version": "7.63.0", "versionType": "semver" }, { "lessThanOrEqual": "7.62.0", "status": "affected", "version": "7.62.0", "versionType": "semver" }, { "lessThanOrEqual": "7.61.1", "status": "affected", "version": "7.61.1", "versionType": "semver" }, { "lessThanOrEqual": "7.61.0", "status": "affected", "version": "7.61.0", "versionType": "semver" }, { "lessThanOrEqual": "7.60.0", "status": "affected", "version": "7.60.0", "versionType": "semver" }, { "lessThanOrEqual": "7.59.0", "status": "affected", "version": "7.59.0", "versionType": "semver" }, { "lessThanOrEqual": "7.58.0", "status": "affected", "version": "7.58.0", "versionType": "semver" }, { "lessThanOrEqual": "7.57.0", "status": "affected", "version": "7.57.0", "versionType": "semver" }, { "lessThanOrEqual": "7.56.1", "status": "affected", "version": "7.56.1", "versionType": "semver" }, { "lessThanOrEqual": "7.56.0", "status": "affected", "version": "7.56.0", "versionType": "semver" }, { "lessThanOrEqual": "7.55.1", "status": "affected", "version": "7.55.1", "versionType": "semver" }, { "lessThanOrEqual": "7.55.0", "status": "affected", "version": "7.55.0", "versionType": "semver" }, { "lessThanOrEqual": "7.54.1", "status": "affected", "version": "7.54.1", "versionType": "semver" }, { "lessThanOrEqual": "7.54.0", "status": "affected", "version": "7.54.0", "versionType": "semver" }, { "lessThanOrEqual": "7.53.1", "status": "affected", "version": "7.53.1", "versionType": "semver" }, { "lessThanOrEqual": "7.53.0", "status": "affected", "version": "7.53.0", "versionType": "semver" }, { "lessThanOrEqual": "7.52.1", "status": "affected", "version": "7.52.1", "versionType": "semver" }, { "lessThanOrEqual": "7.52.0", "status": "affected", "version": "7.52.0", "versionType": "semver" }, { "lessThanOrEqual": "7.51.0", "status": "affected", "version": "7.51.0", "versionType": "semver" }, { "lessThanOrEqual": "7.50.3", "status": "affected", "version": "7.50.3", "versionType": "semver" }, { "lessThanOrEqual": "7.50.2", "status": "affected", "version": "7.50.2", "versionType": "semver" }, { "lessThanOrEqual": "7.50.1", "status": "affected", "version": "7.50.1", "versionType": "semver" }, { "lessThanOrEqual": "7.50.0", "status": "affected", "version": "7.50.0", "versionType": "semver" }, { "lessThanOrEqual": "7.49.1", "status": "affected", "version": "7.49.1", "versionType": "semver" }, { "lessThanOrEqual": "7.49.0", "status": "affected", "version": "7.49.0", "versionType": "semver" }, { "lessThanOrEqual": "7.48.0", "status": "affected", "version": "7.48.0", "versionType": "semver" }, { "lessThanOrEqual": "7.47.1", "status": "affected", "version": "7.47.1", "versionType": "semver" }, { "lessThanOrEqual": "7.47.0", "status": "affected", "version": "7.47.0", "versionType": "semver" }, { "lessThanOrEqual": "7.46.0", "status": "affected", "version": "7.46.0", "versionType": "semver" }, { "lessThanOrEqual": "7.45.0", "status": "affected", "version": "7.45.0", "versionType": "semver" }, { "lessThanOrEqual": "7.44.0", "status": "affected", "version": "7.44.0", "versionType": "semver" }, { "lessThanOrEqual": "7.43.0", "status": "affected", "version": "7.43.0", "versionType": "semver" }, { "lessThanOrEqual": "7.42.1", "status": "affected", "version": "7.42.1", "versionType": "semver" }, { "lessThanOrEqual": "7.42.0", "status": "affected", "version": "7.42.0", "versionType": "semver" }, { "lessThanOrEqual": "7.41.0", "status": "affected", "version": "7.41.0", "versionType": "semver" }, { "lessThanOrEqual": "7.40.0", "status": "affected", "version": "7.40.0", "versionType": "semver" }, { "lessThanOrEqual": "7.39.0", "status": "affected", "version": "7.39.0", "versionType": "semver" }, { "lessThanOrEqual": "7.38.0", "status": "affected", "version": "7.38.0", "versionType": "semver" }, { "lessThanOrEqual": "7.37.1", "status": "affected", "version": "7.37.1", "versionType": "semver" }, { "lessThanOrEqual": "7.37.0", "status": "affected", "version": "7.37.0", "versionType": "semver" }, { "lessThanOrEqual": "7.36.0", "status": "affected", "version": "7.36.0", "versionType": "semver" }, { "lessThanOrEqual": "7.35.0", "status": "affected", "version": "7.35.0", "versionType": "semver" }, { "lessThanOrEqual": "7.34.0", "status": "affected", "version": "7.34.0", "versionType": "semver" }, { "lessThanOrEqual": "7.33.0", "status": "affected", "version": "7.33.0", "versionType": "semver" }, { "lessThanOrEqual": "7.32.0", "status": "affected", "version": "7.32.0", "versionType": "semver" }, { "lessThanOrEqual": "7.31.0", "status": "affected", "version": "7.31.0", "versionType": "semver" }, { "lessThanOrEqual": "7.30.0", "status": "affected", "version": "7.30.0", "versionType": "semver" }, { "lessThanOrEqual": "7.29.0", "status": "affected", "version": "7.29.0", "versionType": "semver" }, { "lessThanOrEqual": "7.28.1", "status": "affected", "version": "7.28.1", "versionType": "semver" }, { "lessThanOrEqual": "7.28.0", "status": "affected", "version": "7.28.0", "versionType": "semver" }, { "lessThanOrEqual": "7.27.0", "status": "affected", "version": "7.27.0", "versionType": "semver" }, { "lessThanOrEqual": "7.26.0", "status": "affected", "version": "7.26.0", "versionType": "semver" }, { "lessThanOrEqual": "7.25.0", "status": "affected", "version": "7.25.0", "versionType": "semver" }, { "lessThanOrEqual": "7.24.0", "status": "affected", "version": "7.24.0", "versionType": "semver" }, { "lessThanOrEqual": "7.23.1", "status": "affected", "version": "7.23.1", "versionType": "semver" }, { "lessThanOrEqual": "7.23.0", "status": "affected", "version": "7.23.0", "versionType": "semver" }, { "lessThanOrEqual": "7.22.0", "status": "affected", "version": "7.22.0", "versionType": "semver" }, { "lessThanOrEqual": "7.21.7", "status": "affected", "version": "7.21.7", "versionType": "semver" }, { "lessThanOrEqual": "7.21.6", "status": "affected", "version": "7.21.6", "versionType": "semver" }, { "lessThanOrEqual": "7.21.5", "status": "affected", "version": "7.21.5", "versionType": "semver" }, { "lessThanOrEqual": "7.21.4", "status": "affected", "version": "7.21.4", "versionType": "semver" }, { "lessThanOrEqual": "7.21.3", "status": "affected", "version": "7.21.3", "versionType": "semver" }, { "lessThanOrEqual": "7.21.2", "status": "affected", "version": "7.21.2", "versionType": "semver" }, { "lessThanOrEqual": "7.21.1", "status": "affected", "version": "7.21.1", "versionType": "semver" }, { "lessThanOrEqual": "7.21.0", "status": "affected", "version": "7.21.0", "versionType": "semver" }, { "lessThanOrEqual": "7.20.1", "status": "affected", "version": "7.20.1", "versionType": "semver" }, { "lessThanOrEqual": "7.20.0", "status": "affected", "version": "7.20.0", "versionType": "semver" }, { "lessThanOrEqual": "7.19.7", "status": "affected", "version": "7.19.7", "versionType": "semver" }, { "lessThanOrEqual": "7.19.6", "status": "affected", "version": "7.19.6", "versionType": "semver" }, { "lessThanOrEqual": "7.19.5", "status": "affected", "version": "7.19.5", "versionType": "semver" }, { "lessThanOrEqual": "7.19.4", "status": "affected", "version": "7.19.4", "versionType": "semver" }, { "lessThanOrEqual": "7.19.3", "status": "affected", "version": "7.19.3", "versionType": "semver" }, { "lessThanOrEqual": "7.19.2", "status": "affected", "version": "7.19.2", "versionType": "semver" }, { "lessThanOrEqual": "7.19.1", "status": "affected", "version": "7.19.1", "versionType": "semver" }, { "lessThanOrEqual": "7.19.0", "status": "affected", "version": "7.19.0", "versionType": "semver" }, { "lessThanOrEqual": "7.18.2", "status": "affected", "version": "7.18.2", "versionType": "semver" }, { "lessThanOrEqual": "7.18.1", "status": "affected", "version": "7.18.1", "versionType": "semver" }, { "lessThanOrEqual": "7.18.0", "status": "affected", "version": "7.18.0", "versionType": "semver" }, { "lessThanOrEqual": "7.17.1", "status": "affected", "version": "7.17.1", "versionType": "semver" }, { "lessThanOrEqual": "7.17.0", "status": "affected", "version": "7.17.0", "versionType": "semver" }, { "lessThanOrEqual": "7.16.4", "status": "affected", "version": "7.16.4", "versionType": "semver" }, { "lessThanOrEqual": "7.16.3", "status": "affected", "version": "7.16.3", "versionType": "semver" }, { "lessThanOrEqual": "7.16.2", "status": "affected", "version": "7.16.2", "versionType": "semver" }, { "lessThanOrEqual": "7.16.1", "status": "affected", "version": "7.16.1", "versionType": "semver" }, { "lessThanOrEqual": "7.16.0", "status": "affected", "version": "7.16.0", "versionType": "semver" }, { "lessThanOrEqual": "7.15.5", "status": "affected", "version": "7.15.5", "versionType": "semver" }, { "lessThanOrEqual": "7.15.4", "status": "affected", "version": "7.15.4", "versionType": "semver" }, { "lessThanOrEqual": "7.15.3", "status": "affected", "version": "7.15.3", "versionType": "semver" }, { "lessThanOrEqual": "7.15.2", "status": "affected", "version": "7.15.2", "versionType": "semver" }, { "lessThanOrEqual": "7.15.1", "status": "affected", "version": "7.15.1", "versionType": "semver" }, { "lessThanOrEqual": "7.15.0", "status": "affected", "version": "7.15.0", "versionType": "semver" }, { "lessThanOrEqual": "7.14.1", "status": "affected", "version": "7.14.1", "versionType": "semver" }, { "lessThanOrEqual": "7.14.0", "status": "affected", "version": "7.14.0", "versionType": "semver" }, { "lessThanOrEqual": "7.13.2", "status": "affected", "version": "7.13.2", "versionType": "semver" }, { "lessThanOrEqual": "7.13.1", "status": "affected", "version": "7.13.1", "versionType": "semver" }, { "lessThanOrEqual": "7.13.0", "status": "affected", "version": "7.13.0", "versionType": "semver" }, { "lessThanOrEqual": "7.12.3", "status": "affected", "version": "7.12.3", "versionType": "semver" }, { "lessThanOrEqual": "7.12.2", "status": "affected", "version": "7.12.2", "versionType": "semver" }, { "lessThanOrEqual": "7.12.1", "status": "affected", "version": "7.12.1", "versionType": "semver" }, { "lessThanOrEqual": "7.12.0", "status": "affected", "version": "7.12.0", "versionType": "semver" }, { "lessThanOrEqual": "7.11.2", "status": "affected", "version": "7.11.2", "versionType": "semver" }, { "lessThanOrEqual": "7.11.1", "status": "affected", "version": "7.11.1", "versionType": "semver" }, { "lessThanOrEqual": "7.11.0", "status": "affected", "version": "7.11.0", "versionType": "semver" }, { "lessThanOrEqual": "7.10.8", "status": "affected", "version": "7.10.8", "versionType": "semver" }, { "lessThanOrEqual": "7.10.7", "status": "affected", "version": "7.10.7", "versionType": "semver" }, { "lessThanOrEqual": "7.10.6", "status": "affected", "version": "7.10.6", "versionType": "semver" }, { "lessThanOrEqual": "7.10.5", "status": "affected", "version": "7.10.5", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "z2_" }, { "lang": "en", "type": "remediation developer", "value": "Daniel Stenberg" } ], "descriptions": [ { "lang": "en", "value": "When libcurl is asked to perform automatic gzip decompression of\ncontent-encoded HTTP responses with the `CURLOPT_ACCEPT_ENCODING` option,\n**using zlib 1.2.0.3 or older**, an attacker-controlled integer overflow would\nmake libcurl perform a buffer overflow." } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-680 Integer Overflow to Buffer Overflow", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-05T09:18:20.468Z", "orgId": "2499f714-1537-4658-8207-48ae4bb9eae9", "shortName": "curl" }, "references": [ { "name": "json", "url": "https://curl.se/docs/CVE-2025-0725.json" }, { "name": "www", "url": "https://curl.se/docs/CVE-2025-0725.html" }, { "name": "issue", "url": "https://hackerone.com/reports/2956023" } ], "title": "gzip integer overflow" } }, "cveMetadata": { "assignerOrgId": "2499f714-1537-4658-8207-48ae4bb9eae9", "assignerShortName": "curl", "cveId": "CVE-2025-0725", "datePublished": "2025-02-05T09:18:20.468Z", "dateReserved": "2025-01-27T04:58:09.514Z", "dateUpdated": "2025-06-12T16:04:29.956Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-7167 (GCVE-0-2016-7167)
Vulnerability from cvelistv5
Published
2016-10-07 14:00
Modified
2024-08-06 01:50
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple integer overflows in the (1) curl_escape, (2) curl_easy_escape, (3) curl_unescape, and (4) curl_easy_unescape functions in libcurl before 7.50.3 allow attackers to have unspecified impact via a string of length 0xffffffff, which triggers a heap-based buffer overflow.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T01:50:47.483Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "FEDORA-2016-80f4f71eff", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZMRWVISG7VUCYRMF23A2UHMYD72VQWAK/" }, { "name": "SSA:2016-259-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred" ], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.538632" }, { "name": "RHSA-2018:3558", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:3558" }, { "name": "FEDORA-2016-08533fc59c", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B3IU2FRXQNU6UJIQT4NGLWWTP2GJQXO7/" }, { "name": "92975", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/92975" }, { "name": "[debian-lts-announce] 20181106 [SECURITY] [DLA 1568-1] curl security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html" }, { "name": "1036813", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1036813" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://curl.haxx.se/docs/adv_20160914.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "name": "RHSA-2017:2016", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:2016" }, { "name": "RHSA-2018:2486", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2486" }, { "name": "GLSA-201701-47", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201701-47" }, { "name": "FEDORA-2016-7a2ed52d41", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTH54DFOS4TSYPG5XKJDGAG4XPAR4T7M/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-09-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple integer overflows in the (1) curl_escape, (2) curl_easy_escape, (3) curl_unescape, and (4) curl_easy_unescape functions in libcurl before 7.50.3 allow attackers to have unspecified impact via a string of length 0xffffffff, which triggers a heap-based buffer overflow." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-11-13T10:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "FEDORA-2016-80f4f71eff", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZMRWVISG7VUCYRMF23A2UHMYD72VQWAK/" }, { "name": "SSA:2016-259-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE" ], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.538632" }, { "name": "RHSA-2018:3558", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:3558" }, { "name": "FEDORA-2016-08533fc59c", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B3IU2FRXQNU6UJIQT4NGLWWTP2GJQXO7/" }, { "name": "92975", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/92975" }, { "name": "[debian-lts-announce] 20181106 [SECURITY] [DLA 1568-1] curl security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html" }, { "name": "1036813", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1036813" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://curl.haxx.se/docs/adv_20160914.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "name": "RHSA-2017:2016", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:2016" }, { "name": "RHSA-2018:2486", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2486" }, { "name": "GLSA-201701-47", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201701-47" }, { "name": "FEDORA-2016-7a2ed52d41", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTH54DFOS4TSYPG5XKJDGAG4XPAR4T7M/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2016-7167", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple integer overflows in the (1) curl_escape, (2) curl_easy_escape, (3) curl_unescape, and (4) curl_easy_unescape functions in libcurl before 7.50.3 allow attackers to have unspecified impact via a string of length 0xffffffff, which triggers a heap-based buffer overflow." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "FEDORA-2016-80f4f71eff", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZMRWVISG7VUCYRMF23A2UHMYD72VQWAK/" }, { "name": "SSA:2016-259-01", "refsource": "SLACKWARE", "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.538632" }, { "name": "RHSA-2018:3558", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:3558" }, { "name": "FEDORA-2016-08533fc59c", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B3IU2FRXQNU6UJIQT4NGLWWTP2GJQXO7/" }, { "name": "92975", "refsource": "BID", "url": "http://www.securityfocus.com/bid/92975" }, { "name": "[debian-lts-announce] 20181106 [SECURITY] [DLA 1568-1] curl security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html" }, { "name": "1036813", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1036813" }, { "name": "https://curl.haxx.se/docs/adv_20160914.html", "refsource": "CONFIRM", "url": "https://curl.haxx.se/docs/adv_20160914.html" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "name": "RHSA-2017:2016", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:2016" }, { "name": "RHSA-2018:2486", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2486" }, { "name": "GLSA-201701-47", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201701-47" }, { "name": "FEDORA-2016-7a2ed52d41", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LTH54DFOS4TSYPG5XKJDGAG4XPAR4T7M/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2016-7167", "datePublished": "2016-10-07T14:00:00", "dateReserved": "2016-09-08T00:00:00", "dateUpdated": "2024-08-06T01:50:47.483Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-1000254 (GCVE-0-2017-1000254)
Vulnerability from cvelistv5
Published
2017-10-06 13:00
Modified
2024-08-05 22:00
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
libcurl may read outside of a heap allocated buffer when doing FTP. When libcurl connects to an FTP server and successfully logs in (anonymous or not), it asks the server for the current directory with the `PWD` command. The server then responds with a 257 response containing the path, inside double quotes. The returned path name is then kept by libcurl for subsequent uses. Due to a flaw in the string parser for this directory name, a directory name passed like this but without a closing double quote would lead to libcurl not adding a trailing NUL byte to the buffer holding the name. When libcurl would then later access the string, it could read beyond the allocated heap buffer and crash or wrongly access data beyond the buffer, thinking it was part of the path. A malicious server could abuse this fact and effectively prevent libcurl-based clients to work with it - the PWD command is always issued on new FTP connections and the mistake has a high chance of causing a segfault. The simple fact that this has issue remained undiscovered for this long could suggest that malformed PWD responses are rare in benign servers. We are not aware of any exploit of this flaw. This bug was introduced in commit [415d2e7cb7](https://github.com/curl/curl/commit/415d2e7cb7), March 2005. In libcurl version 7.56.0, the parser always zero terminates the string but also rejects it if not terminated properly with a final double quote.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T22:00:39.675Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-201712-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201712-04" }, { "name": "RHSA-2018:3558", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:3558" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/HT208331" }, { "name": "1039509", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1039509" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://curl.haxx.se/673d0cd8.patch" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://curl.haxx.se/docs/adv_20171004.html" }, { "name": "RHSA-2018:2486", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2486" }, { "name": "DSA-3992", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2017/dsa-3992" }, { "name": "101115", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/101115" }, { "name": "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "name": "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "dateAssigned": "2017-09-25T00:00:00", "datePublic": "2017-10-04T00:00:00", "descriptions": [ { "lang": "en", "value": "libcurl may read outside of a heap allocated buffer when doing FTP. When libcurl connects to an FTP server and successfully logs in (anonymous or not), it asks the server for the current directory with the `PWD` command. The server then responds with a 257 response containing the path, inside double quotes. The returned path name is then kept by libcurl for subsequent uses. Due to a flaw in the string parser for this directory name, a directory name passed like this but without a closing double quote would lead to libcurl not adding a trailing NUL byte to the buffer holding the name. When libcurl would then later access the string, it could read beyond the allocated heap buffer and crash or wrongly access data beyond the buffer, thinking it was part of the path. A malicious server could abuse this fact and effectively prevent libcurl-based clients to work with it - the PWD command is always issued on new FTP connections and the mistake has a high chance of causing a segfault. The simple fact that this has issue remained undiscovered for this long could suggest that malformed PWD responses are rare in benign servers. We are not aware of any exploit of this flaw. This bug was introduced in commit [415d2e7cb7](https://github.com/curl/curl/commit/415d2e7cb7), March 2005. In libcurl version 7.56.0, the parser always zero terminates the string but also rejects it if not terminated properly with a final double quote." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-29T14:06:36", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "GLSA-201712-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201712-04" }, { "name": "RHSA-2018:3558", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:3558" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/HT208331" }, { "name": "1039509", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1039509" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://curl.haxx.se/673d0cd8.patch" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://curl.haxx.se/docs/adv_20171004.html" }, { "name": "RHSA-2018:2486", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2486" }, { "name": "DSA-3992", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2017/dsa-3992" }, { "name": "101115", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/101115" }, { "name": "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "name": "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "DATE_ASSIGNED": "2017-09-25", "ID": "CVE-2017-1000254", "REQUESTER": "daniel@haxx.se", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "libcurl may read outside of a heap allocated buffer when doing FTP. When libcurl connects to an FTP server and successfully logs in (anonymous or not), it asks the server for the current directory with the `PWD` command. The server then responds with a 257 response containing the path, inside double quotes. The returned path name is then kept by libcurl for subsequent uses. Due to a flaw in the string parser for this directory name, a directory name passed like this but without a closing double quote would lead to libcurl not adding a trailing NUL byte to the buffer holding the name. When libcurl would then later access the string, it could read beyond the allocated heap buffer and crash or wrongly access data beyond the buffer, thinking it was part of the path. A malicious server could abuse this fact and effectively prevent libcurl-based clients to work with it - the PWD command is always issued on new FTP connections and the mistake has a high chance of causing a segfault. The simple fact that this has issue remained undiscovered for this long could suggest that malformed PWD responses are rare in benign servers. We are not aware of any exploit of this flaw. This bug was introduced in commit [415d2e7cb7](https://github.com/curl/curl/commit/415d2e7cb7), March 2005. In libcurl version 7.56.0, the parser always zero terminates the string but also rejects it if not terminated properly with a final double quote." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-201712-04", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201712-04" }, { "name": "RHSA-2018:3558", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:3558" }, { "name": "https://support.apple.com/HT208331", "refsource": "CONFIRM", "url": "https://support.apple.com/HT208331" }, { "name": "1039509", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1039509" }, { "name": "https://curl.haxx.se/673d0cd8.patch", "refsource": "CONFIRM", "url": "https://curl.haxx.se/673d0cd8.patch" }, { "name": "https://curl.haxx.se/docs/adv_20171004.html", "refsource": "CONFIRM", "url": "https://curl.haxx.se/docs/adv_20171004.html" }, { "name": "RHSA-2018:2486", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2486" }, { "name": "DSA-3992", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2017/dsa-3992" }, { "name": "101115", "refsource": "BID", "url": "http://www.securityfocus.com/bid/101115" }, { "name": "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" }, { "name": "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-1000254", "datePublished": "2017-10-06T13:00:00", "dateReserved": "2017-10-06T00:00:00", "dateUpdated": "2024-08-05T22:00:39.675Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2014-8151 (GCVE-0-2014-8151)
Vulnerability from cvelistv5
Published
2015-01-15 15:00
Modified
2024-08-06 13:10
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The darwinssl_connect_step1 function in lib/vtls/curl_darwinssl.c in libcurl 7.31.0 through 7.39.0, when using the DarwinSSL (aka SecureTransport) back-end for TLS, does not check if a cached TLS session validated the certificate when reusing the session, which allows man-in-the-middle attackers to spoof servers via a crafted certificate.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:10:51.108Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "APPLE-SA-2015-08-13-2", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://curl.haxx.se/docs/adv_20150108A.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10743" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT205031" }, { "name": "GLSA-201701-47", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201701-47" }, { "name": "61925", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61925" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-01-08T00:00:00", "descriptions": [ { "lang": "en", "value": "The darwinssl_connect_step1 function in lib/vtls/curl_darwinssl.c in libcurl 7.31.0 through 7.39.0, when using the DarwinSSL (aka SecureTransport) back-end for TLS, does not check if a cached TLS session validated the certificate when reusing the session, which allows man-in-the-middle attackers to spoof servers via a crafted certificate." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-06-30T16:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "APPLE-SA-2015-08-13-2", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://curl.haxx.se/docs/adv_20150108A.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10743" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT205031" }, { "name": "GLSA-201701-47", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201701-47" }, { "name": "61925", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61925" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-8151", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The darwinssl_connect_step1 function in lib/vtls/curl_darwinssl.c in libcurl 7.31.0 through 7.39.0, when using the DarwinSSL (aka SecureTransport) back-end for TLS, does not check if a cached TLS session validated the certificate when reusing the session, which allows man-in-the-middle attackers to spoof servers via a crafted certificate." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "APPLE-SA-2015-08-13-2", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html" }, { "name": "http://curl.haxx.se/docs/adv_20150108A.html", "refsource": "CONFIRM", "url": "http://curl.haxx.se/docs/adv_20150108A.html" }, { "name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10743", "refsource": "CONFIRM", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10743" }, { "name": "https://support.apple.com/kb/HT205031", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT205031" }, { "name": "GLSA-201701-47", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201701-47" }, { "name": "61925", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61925" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2014-8151", "datePublished": "2015-01-15T15:00:00", "dateReserved": "2014-10-10T00:00:00", "dateUpdated": "2024-08-06T13:10:51.108Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-1944 (GCVE-0-2013-1944)
Vulnerability from cvelistv5
Published
2013-04-29 22:00
Modified
2024-08-06 15:20
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The tailMatch function in cookie.c in cURL and libcurl before 7.30.0 does not properly match the path domain when sending cookies, which allows remote attackers to steal cookies via a matching suffix in the domain of a URL.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T15:20:37.296Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" }, { "name": "MDVSA-2013:151", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:151" }, { "name": "92316", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/92316" }, { "name": "DSA-2660", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2012/dsa-2660" }, { "name": "FEDORA-2013-6766", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104598.html" }, { "name": "USN-1801-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1801-1" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=950577" }, { "name": "FEDORA-2013-6780", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104207.html" }, { "name": "FEDORA-2013-5618", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102056.html" }, { "name": "FEDORA-2013-5598", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102711.html" }, { "name": "APPLE-SA-2013-10-22-3", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://curl.haxx.se/docs/adv_20130412.html" }, { "name": "openSUSE-SU-2013:0879", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00016.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0121" }, { "name": "59058", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/59058" }, { "name": "53044", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/53044" }, { "name": "RHSA-2013:0771", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0771.html" }, { "name": "53051", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/53051" }, { "name": "FEDORA-2013-7813", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105539.html" }, { "name": "FEDORA-2013-7797", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106606.html" }, { "name": "53097", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/53097" }, { "name": "openSUSE-SU-2013:0876", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00013.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/bagder/curl/commit/2eb8dcf26cb37f09cffe26909a646e702dbcab66" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-04-10T00:00:00", "descriptions": [ { "lang": "en", "value": "The tailMatch function in cookie.c in cURL and libcurl before 7.30.0 does not properly match the path domain when sending cookies, which allows remote attackers to steal cookies via a matching suffix in the domain of a URL." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-09-07T14:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" }, { "name": "MDVSA-2013:151", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:151" }, { "name": "92316", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/92316" }, { "name": "DSA-2660", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2012/dsa-2660" }, { "name": "FEDORA-2013-6766", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104598.html" }, { "name": "USN-1801-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1801-1" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=950577" }, { "name": "FEDORA-2013-6780", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104207.html" }, { "name": "FEDORA-2013-5618", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102056.html" }, { "name": "FEDORA-2013-5598", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102711.html" }, { "name": "APPLE-SA-2013-10-22-3", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://curl.haxx.se/docs/adv_20130412.html" }, { "name": "openSUSE-SU-2013:0879", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00016.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0121" }, { "name": "59058", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/59058" }, { "name": "53044", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/53044" }, { "name": "RHSA-2013:0771", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0771.html" }, { "name": "53051", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/53051" }, { "name": "FEDORA-2013-7813", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105539.html" }, { "name": "FEDORA-2013-7797", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106606.html" }, { "name": "53097", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/53097" }, { "name": "openSUSE-SU-2013:0876", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00013.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/bagder/curl/commit/2eb8dcf26cb37f09cffe26909a646e702dbcab66" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-1944", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The tailMatch function in cookie.c in cURL and libcurl before 7.30.0 does not properly match the path domain when sending cookies, which allows remote attackers to steal cookies via a matching suffix in the domain of a URL." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" }, { "name": "MDVSA-2013:151", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:151" }, { "name": "92316", "refsource": "OSVDB", "url": "http://www.osvdb.org/92316" }, { "name": "DSA-2660", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2012/dsa-2660" }, { "name": "FEDORA-2013-6766", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104598.html" }, { "name": "USN-1801-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1801-1" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=950577", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=950577" }, { "name": "FEDORA-2013-6780", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104207.html" }, { "name": "FEDORA-2013-5618", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102056.html" }, { "name": "FEDORA-2013-5598", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102711.html" }, { "name": "APPLE-SA-2013-10-22-3", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html" }, { "name": "http://curl.haxx.se/docs/adv_20130412.html", "refsource": "CONFIRM", "url": "http://curl.haxx.se/docs/adv_20130412.html" }, { "name": "openSUSE-SU-2013:0879", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00016.html" }, { "name": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0121", "refsource": "MISC", "url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0121" }, { "name": "59058", "refsource": "BID", "url": "http://www.securityfocus.com/bid/59058" }, { "name": "53044", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/53044" }, { "name": "RHSA-2013:0771", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2013-0771.html" }, { "name": "53051", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/53051" }, { "name": "FEDORA-2013-7813", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105539.html" }, { "name": "FEDORA-2013-7797", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106606.html" }, { "name": "53097", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/53097" }, { "name": "openSUSE-SU-2013:0876", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00013.html" }, { "name": "https://github.com/bagder/curl/commit/2eb8dcf26cb37f09cffe26909a646e702dbcab66", "refsource": "CONFIRM", "url": "https://github.com/bagder/curl/commit/2eb8dcf26cb37f09cffe26909a646e702dbcab66" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-1944", "datePublished": "2013-04-29T22:00:00", "dateReserved": "2013-02-19T00:00:00", "dateUpdated": "2024-08-06T15:20:37.296Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-14618 (GCVE-0-2018-14618)
Vulnerability from cvelistv5
Published
2018-09-05 19:00
Modified
2024-08-05 09:29
Severity ?
VLAI Severity ?
EPSS score ?
Summary
curl before version 7.61.1 is vulnerable to a buffer overrun in the NTLM authentication code. The internal function Curl_ntlm_core_mk_nt_hash multiplies the length of the password by two (SUM) to figure out how large temporary storage area to allocate from the heap. The length value is then subsequently used to iterate over the password and generate output into the allocated storage buffer. On systems with a 32 bit size_t, the math to calculate SUM triggers an integer overflow when the password length exceeds 2GB (2^31 bytes). This integer overflow usually causes a very small buffer to actually get allocated instead of the intended very huge one, making the use of that buffer end up in a heap buffer overflow. (This bug is almost identical to CVE-2017-8816.)
References
► | URL | Tags | |||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T09:29:51.906Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://curl.haxx.se/docs/CVE-2018-14618.html" }, { "name": "GLSA-201903-03", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201903-03" }, { "name": "USN-3765-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3765-1/" }, { "name": "RHSA-2018:3558", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:3558" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0014" }, { "name": "DSA-4286", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4286" }, { "name": "1041605", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1041605" }, { "name": "USN-3765-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3765-2/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14618" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-436177.pdf" }, { "name": "RHSA-2019:1880", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:1880" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "curl", "vendor": "[UNKNOWN]", "versions": [ { "status": "affected", "version": "7.61.1" } ] } ], "datePublic": "2018-09-05T00:00:00", "descriptions": [ { "lang": "en", "value": "curl before version 7.61.1 is vulnerable to a buffer overrun in the NTLM authentication code. The internal function Curl_ntlm_core_mk_nt_hash multiplies the length of the password by two (SUM) to figure out how large temporary storage area to allocate from the heap. The length value is then subsequently used to iterate over the password and generate output into the allocated storage buffer. On systems with a 32 bit size_t, the math to calculate SUM triggers an integer overflow when the password length exceeds 2GB (2^31 bytes). This integer overflow usually causes a very small buffer to actually get allocated instead of the intended very huge one, making the use of that buffer end up in a heap buffer overflow. (This bug is almost identical to CVE-2017-8816.)" } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-131", "description": "CWE-131", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-122", "description": "CWE-122", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-07-29T18:06:14", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://curl.haxx.se/docs/CVE-2018-14618.html" }, { "name": "GLSA-201903-03", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201903-03" }, { "name": "USN-3765-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3765-1/" }, { "name": "RHSA-2018:3558", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:3558" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0014" }, { "name": "DSA-4286", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4286" }, { "name": "1041605", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1041605" }, { "name": "USN-3765-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3765-2/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14618" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-436177.pdf" }, { "name": "RHSA-2019:1880", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:1880" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2018-14618", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "curl", "version": { "version_data": [ { "version_value": "7.61.1" } ] } } ] }, "vendor_name": "[UNKNOWN]" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "curl before version 7.61.1 is vulnerable to a buffer overrun in the NTLM authentication code. The internal function Curl_ntlm_core_mk_nt_hash multiplies the length of the password by two (SUM) to figure out how large temporary storage area to allocate from the heap. The length value is then subsequently used to iterate over the password and generate output into the allocated storage buffer. On systems with a 32 bit size_t, the math to calculate SUM triggers an integer overflow when the password length exceeds 2GB (2^31 bytes). This integer overflow usually causes a very small buffer to actually get allocated instead of the intended very huge one, making the use of that buffer end up in a heap buffer overflow. (This bug is almost identical to CVE-2017-8816.)" } ] }, "impact": { "cvss": [ [ { "vectorString": "7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ] ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-131" } ] }, { "description": [ { "lang": "eng", "value": "CWE-122" } ] } ] }, "references": { "reference_data": [ { "name": "https://curl.haxx.se/docs/CVE-2018-14618.html", "refsource": "CONFIRM", "url": "https://curl.haxx.se/docs/CVE-2018-14618.html" }, { "name": "GLSA-201903-03", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201903-03" }, { "name": "USN-3765-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3765-1/" }, { "name": "RHSA-2018:3558", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:3558" }, { "name": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0014", "refsource": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0014" }, { "name": "DSA-4286", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4286" }, { "name": "1041605", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1041605" }, { "name": "USN-3765-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3765-2/" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14618", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14618" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-436177.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-436177.pdf" }, { "name": "RHSA-2019:1880", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:1880" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2018-14618", "datePublished": "2018-09-05T19:00:00", "dateReserved": "2018-07-27T00:00:00", "dateUpdated": "2024-08-05T09:29:51.906Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-2192 (GCVE-0-2011-2192)
Vulnerability from cvelistv5
Published
2011-07-07 21:00
Modified
2024-08-06 22:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The Curl_input_negotiate function in http_negotiate.c in libcurl 7.10.6 through 7.21.6, as used in curl and other products, always performs credential delegation during GSSAPI authentication, which allows remote servers to impersonate clients via GSSAPI requests.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:53:17.373Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "MDVSA-2011:116", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:116" }, { "name": "45181", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/45181" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT5130" }, { "name": "45144", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/45144" }, { "name": "USN-1158-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1158-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://curl.haxx.se/docs/adv_20110623.html" }, { "name": "45067", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/45067" }, { "name": "FEDORA-2011-8640", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062287.html" }, { "name": "1025713", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025713" }, { "name": "RHSA-2011:0918", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0918.html" }, { "name": "APPLE-SA-2012-02-01-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html" }, { "name": "GLSA-201203-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201203-02.xml" }, { "name": "48256", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48256" }, { "name": "DSA-2271", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2011/dsa-2271" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=711454" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://curl.haxx.se/curl-gssapi-delegation.patch" }, { "name": "45088", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/45088" }, { "name": "FEDORA-2011-8586", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061992.html" }, { "name": "45047", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/45047" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-06-23T00:00:00", "descriptions": [ { "lang": "en", "value": "The Curl_input_negotiate function in http_negotiate.c in libcurl 7.10.6 through 7.21.6, as used in curl and other products, always performs credential delegation during GSSAPI authentication, which allows remote servers to impersonate clients via GSSAPI requests." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-04T18:57:02", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "MDVSA-2011:116", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:116" }, { "name": "45181", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/45181" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT5130" }, { "name": "45144", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/45144" }, { "name": "USN-1158-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1158-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://curl.haxx.se/docs/adv_20110623.html" }, { "name": "45067", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/45067" }, { "name": "FEDORA-2011-8640", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062287.html" }, { "name": "1025713", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025713" }, { "name": "RHSA-2011:0918", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0918.html" }, { "name": "APPLE-SA-2012-02-01-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html" }, { "name": "GLSA-201203-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201203-02.xml" }, { "name": "48256", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48256" }, { "name": "DSA-2271", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2011/dsa-2271" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=711454" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://curl.haxx.se/curl-gssapi-delegation.patch" }, { "name": "45088", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/45088" }, { "name": "FEDORA-2011-8586", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061992.html" }, { "name": "45047", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/45047" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2011-2192", "datePublished": "2011-07-07T21:00:00", "dateReserved": "2011-05-31T00:00:00", "dateUpdated": "2024-08-06T22:53:17.373Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2014-8150 (GCVE-0-2014-8150)
Vulnerability from cvelistv5
Published
2015-01-15 15:00
Modified
2024-08-06 13:10
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
CRLF injection vulnerability in libcurl 6.0 through 7.x before 7.40.0, when using an HTTP proxy, allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via CRLF sequences in a URL.
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:10:50.913Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "62361", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62361" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10131" }, { "name": "FEDORA-2015-6853", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157188.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://advisories.mageia.org/MGASA-2015-0020.html" }, { "name": "71964", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/71964" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html" }, { "name": "1032768", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1032768" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "name": "FEDORA-2015-0418", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147856.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://curl.haxx.se/docs/adv_20150108B.html" }, { "name": "APPLE-SA-2015-08-13-2", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html" }, { "name": "RHSA-2015:1254", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1254.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10743" }, { "name": "openSUSE-SU-2015:0248", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00040.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT205031" }, { "name": "FEDORA-2015-0415", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147876.html" }, { "name": "USN-2474-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2474-1" }, { "name": "GLSA-201701-47", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201701-47" }, { "name": "FEDORA-2015-6864", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156945.html" }, { "name": "MDVSA-2015:021", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:021" }, { "name": "62075", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62075" }, { "name": "DSA-3122", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2015/dsa-3122" }, { "name": "61925", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61925" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-01-08T00:00:00", "descriptions": [ { "lang": "en", "value": "CRLF injection vulnerability in libcurl 6.0 through 7.x before 7.40.0, when using an HTTP proxy, allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via CRLF sequences in a URL." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-04T19:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "62361", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62361" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10131" }, { "name": "FEDORA-2015-6853", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157188.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://advisories.mageia.org/MGASA-2015-0020.html" }, { "name": "71964", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/71964" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html" }, { "name": "1032768", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1032768" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "name": "FEDORA-2015-0418", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147856.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://curl.haxx.se/docs/adv_20150108B.html" }, { "name": "APPLE-SA-2015-08-13-2", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html" }, { "name": "RHSA-2015:1254", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1254.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10743" }, { "name": "openSUSE-SU-2015:0248", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00040.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT205031" }, { "name": "FEDORA-2015-0415", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147876.html" }, { "name": "USN-2474-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2474-1" }, { "name": "GLSA-201701-47", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201701-47" }, { "name": "FEDORA-2015-6864", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156945.html" }, { "name": "MDVSA-2015:021", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:021" }, { "name": "62075", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62075" }, { "name": "DSA-3122", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2015/dsa-3122" }, { "name": "61925", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61925" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-8150", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "CRLF injection vulnerability in libcurl 6.0 through 7.x before 7.40.0, when using an HTTP proxy, allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via CRLF sequences in a URL." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "62361", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62361" }, { "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10131", "refsource": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10131" }, { "name": "FEDORA-2015-6853", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157188.html" }, { "name": "http://advisories.mageia.org/MGASA-2015-0020.html", "refsource": "CONFIRM", "url": "http://advisories.mageia.org/MGASA-2015-0020.html" }, { "name": "71964", "refsource": "BID", "url": "http://www.securityfocus.com/bid/71964" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html" }, { "name": "1032768", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1032768" }, { "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "name": "FEDORA-2015-0418", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147856.html" }, { "name": "http://curl.haxx.se/docs/adv_20150108B.html", "refsource": "CONFIRM", "url": "http://curl.haxx.se/docs/adv_20150108B.html" }, { "name": "APPLE-SA-2015-08-13-2", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html" }, { "name": "RHSA-2015:1254", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2015-1254.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html" }, { "name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10743", "refsource": "CONFIRM", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10743" }, { "name": "openSUSE-SU-2015:0248", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00040.html" }, { "name": "https://support.apple.com/kb/HT205031", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT205031" }, { "name": "FEDORA-2015-0415", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147876.html" }, { "name": "USN-2474-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2474-1" }, { "name": "GLSA-201701-47", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201701-47" }, { "name": "FEDORA-2015-6864", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156945.html" }, { "name": "MDVSA-2015:021", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:021" }, { "name": "62075", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62075" }, { "name": "DSA-3122", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2015/dsa-3122" }, { "name": "61925", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61925" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2014-8150", "datePublished": "2015-01-15T15:00:00", "dateReserved": "2014-10-10T00:00:00", "dateUpdated": "2024-08-06T13:10:50.913Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-22924 (GCVE-0-2021-22924)
Vulnerability from cvelistv5
Published
2021-08-05 20:16
Modified
2025-06-09 15:02
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-20 - Improper Input Validation ()
Summary
libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse, if one of them matches the setup.Due to errors in the logic, the config matching function did not take 'issuercert' into account and it compared the involved paths *case insensitively*,which could lead to libcurl reusing wrong connections.File paths are, or can be, case sensitive on many systems but not all, and caneven vary depending on used file systems.The comparison also didn't include the 'issuer cert' which a transfer can setto qualify how to verify the server certificate.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | https://github.com/curl/curl |
Version: curl 7.10.4 to and include curl 7.77.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:58:25.955Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1223565" }, { "name": "FEDORA-2021-5d21b90a30", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/" }, { "name": "[debian-lts-announce] 20210813 [SECURITY] [DLA 2734-1] curl security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html" }, { "name": "[kafka-dev] 20210831 Security vulnerabilities in kafka:2.13-2.6.0/2.7.0 docker image", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cdev.kafka.apache.org%3E" }, { "name": "[kafka-users] 20210831 Security vulnerabilities in kafka:2.13-2.6.0/2.7.0 docker image", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cusers.kafka.apache.org%3E" }, { "name": "[kafka-users] 20210901 Re: [EXTERNAL] Re: Security vulnerabilities in kafka:2.13-2.6.0/2.7.0 docker image", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cusers.kafka.apache.org%3E" }, { "name": "[kafka-dev] 20210901 Re: [EXTERNAL] Re: Security vulnerabilities in kafka:2.13-2.6.0/2.7.0 docker image", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cdev.kafka.apache.org%3E" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20210902-0003/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf" }, { "name": "DSA-5197", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2022/dsa-5197" }, { "name": "[debian-lts-announce] 20220828 [SECURITY] [DLA 3085-1] curl security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2021-22924", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-03-27T19:35:55.513610Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-09T15:02:19.721Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "https://github.com/curl/curl", "vendor": "n/a", "versions": [ { "status": "affected", "version": "curl 7.10.4 to and include curl 7.77.0" } ] } ], "descriptions": [ { "lang": "en", "value": "libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse, if one of them matches the setup.Due to errors in the logic, the config matching function did not take \u0027issuercert\u0027 into account and it compared the involved paths *case insensitively*,which could lead to libcurl reusing wrong connections.File paths are, or can be, case sensitive on many systems but not all, and caneven vary depending on used file systems.The comparison also didn\u0027t include the \u0027issuer cert\u0027 which a transfer can setto qualify how to verify the server certificate." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "Improper Input Validation (CWE-20)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-29T00:06:17.000Z", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1223565" }, { "name": "FEDORA-2021-5d21b90a30", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/" }, { "name": "[debian-lts-announce] 20210813 [SECURITY] [DLA 2734-1] curl security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html" }, { "name": "[kafka-dev] 20210831 Security vulnerabilities in kafka:2.13-2.6.0/2.7.0 docker image", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cdev.kafka.apache.org%3E" }, { "name": "[kafka-users] 20210831 Security vulnerabilities in kafka:2.13-2.6.0/2.7.0 docker image", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cusers.kafka.apache.org%3E" }, { "name": "[kafka-users] 20210901 Re: [EXTERNAL] Re: Security vulnerabilities in kafka:2.13-2.6.0/2.7.0 docker image", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cusers.kafka.apache.org%3E" }, { "name": "[kafka-dev] 20210901 Re: [EXTERNAL] Re: Security vulnerabilities in kafka:2.13-2.6.0/2.7.0 docker image", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cdev.kafka.apache.org%3E" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20210902-0003/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf" }, { "name": "DSA-5197", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2022/dsa-5197" }, { "name": "[debian-lts-announce] 20220828 [SECURITY] [DLA 3085-1] curl security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "support@hackerone.com", "ID": "CVE-2021-22924", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "https://github.com/curl/curl", "version": { "version_data": [ { "version_value": "curl 7.10.4 to and include curl 7.77.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse, if one of them matches the setup.Due to errors in the logic, the config matching function did not take \u0027issuercert\u0027 into account and it compared the involved paths *case insensitively*,which could lead to libcurl reusing wrong connections.File paths are, or can be, case sensitive on many systems but not all, and caneven vary depending on used file systems.The comparison also didn\u0027t include the \u0027issuer cert\u0027 which a transfer can setto qualify how to verify the server certificate." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Input Validation (CWE-20)" } ] } ] }, "references": { "reference_data": [ { "name": "https://hackerone.com/reports/1223565", "refsource": "MISC", "url": "https://hackerone.com/reports/1223565" }, { "name": "FEDORA-2021-5d21b90a30", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/" }, { "name": "[debian-lts-announce] 20210813 [SECURITY] [DLA 2734-1] curl security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html" }, { "name": "[kafka-dev] 20210831 Security vulnerabilities in kafka:2.13-2.6.0/2.7.0 docker image", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E" }, { "name": "[kafka-users] 20210831 Security vulnerabilities in kafka:2.13-2.6.0/2.7.0 docker image", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E" }, { "name": "[kafka-users] 20210901 Re: [EXTERNAL] Re: Security vulnerabilities in kafka:2.13-2.6.0/2.7.0 docker image", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E" }, { "name": "[kafka-dev] 20210901 Re: [EXTERNAL] Re: Security vulnerabilities in kafka:2.13-2.6.0/2.7.0 docker image", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E" }, { "name": "https://www.oracle.com/security-alerts/cpuoct2021.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "name": "https://security.netapp.com/advisory/ntap-20210902-0003/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210902-0003/" }, { "name": "https://www.oracle.com/security-alerts/cpujan2022.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf" }, { "name": "DSA-5197", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2022/dsa-5197" }, { "name": "[debian-lts-announce] 20220828 [SECURITY] [DLA 3085-1] curl security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2021-22924", "datePublished": "2021-08-05T20:16:56.000Z", "dateReserved": "2021-01-06T00:00:00.000Z", "dateUpdated": "2025-06-09T15:02:19.721Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-8286 (GCVE-0-2020-8286)
Vulnerability from cvelistv5
Published
2020-12-14 19:39
Modified
2024-11-15 15:30
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-295 - Improper Certificate Validation ()
Summary
curl 7.41.0 through 7.73.0 is vulnerable to an improper check for certificate revocation due to insufficient verification of the OCSP response.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | https://github.com/curl/curl |
Version: 7.41.0 to and including 7.73.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T09:56:28.324Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1048457" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://curl.se/docs/CVE-2020-8286.html" }, { "name": "FEDORA-2020-ceaf490686", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG/" }, { "name": "[debian-lts-announce] 20201219 [SECURITY] [DLA 2500-1] curl security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00029.html" }, { "name": "FEDORA-2020-7ab62c73bc", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL/" }, { "name": "GLSA-202012-14", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202012-14" }, { "name": "DSA-4881", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2021/dsa-4881" }, { "name": "20210427 APPLE-SA-2021-04-26-3 Security Update 2021-002 Catalina", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2021/Apr/51" }, { "name": "20210427 APPLE-SA-2021-04-26-2 macOS Big Sur 11.3", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2021/Apr/50" }, { "name": "20210427 APPLE-SA-2021-04-26-4 Security Update 2021-003 Mojave", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2021/Apr/54" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20210122-0007/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT212325" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT212326" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT212327" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-200951.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2020-8286", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T15:29:39.778689Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T15:30:03.757Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "https://github.com/curl/curl", "vendor": "n/a", "versions": [ { "status": "affected", "version": "7.41.0 to and including 7.73.0" } ] } ], "descriptions": [ { "lang": "en", "value": "curl 7.41.0 through 7.73.0 is vulnerable to an improper check for certificate revocation due to insufficient verification of the OCSP response." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-295", "description": "Improper Certificate Validation (CWE-295)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-19T23:23:30", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1048457" }, { "tags": [ "x_refsource_MISC" ], "url": "https://curl.se/docs/CVE-2020-8286.html" }, { "name": "FEDORA-2020-ceaf490686", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG/" }, { "name": "[debian-lts-announce] 20201219 [SECURITY] [DLA 2500-1] curl security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00029.html" }, { "name": "FEDORA-2020-7ab62c73bc", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL/" }, { "name": "GLSA-202012-14", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202012-14" }, { "name": "DSA-4881", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2021/dsa-4881" }, { "name": "20210427 APPLE-SA-2021-04-26-3 Security Update 2021-002 Catalina", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2021/Apr/51" }, { "name": "20210427 APPLE-SA-2021-04-26-2 macOS Big Sur 11.3", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2021/Apr/50" }, { "name": "20210427 APPLE-SA-2021-04-26-4 Security Update 2021-003 Mojave", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2021/Apr/54" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20210122-0007/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT212325" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT212326" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT212327" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-200951.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "support@hackerone.com", "ID": "CVE-2020-8286", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "https://github.com/curl/curl", "version": { "version_data": [ { "version_value": "7.41.0 to and including 7.73.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "curl 7.41.0 through 7.73.0 is vulnerable to an improper check for certificate revocation due to insufficient verification of the OCSP response." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Certificate Validation (CWE-295)" } ] } ] }, "references": { "reference_data": [ { "name": "https://hackerone.com/reports/1048457", "refsource": "MISC", "url": "https://hackerone.com/reports/1048457" }, { "name": "https://curl.se/docs/CVE-2020-8286.html", "refsource": "MISC", "url": "https://curl.se/docs/CVE-2020-8286.html" }, { "name": "FEDORA-2020-ceaf490686", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG/" }, { "name": "[debian-lts-announce] 20201219 [SECURITY] [DLA 2500-1] curl security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00029.html" }, { "name": "FEDORA-2020-7ab62c73bc", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL/" }, { "name": "GLSA-202012-14", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202012-14" }, { "name": "DSA-4881", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4881" }, { "name": "20210427 APPLE-SA-2021-04-26-3 Security Update 2021-002 Catalina", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/Apr/51" }, { "name": "20210427 APPLE-SA-2021-04-26-2 macOS Big Sur 11.3", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/Apr/50" }, { "name": "20210427 APPLE-SA-2021-04-26-4 Security Update 2021-003 Mojave", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/Apr/54" }, { "name": "https://www.oracle.com/security-alerts/cpuApr2021.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "name": "https://security.netapp.com/advisory/ntap-20210122-0007/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210122-0007/" }, { "name": "https://support.apple.com/kb/HT212325", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT212325" }, { "name": "https://support.apple.com/kb/HT212326", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT212326" }, { "name": "https://support.apple.com/kb/HT212327", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT212327" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-200951.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-200951.pdf" }, { "name": "https://www.oracle.com//security-alerts/cpujul2021.html", "refsource": "MISC", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "name": "https://www.oracle.com/security-alerts/cpuapr2022.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2020-8286", "datePublished": "2020-12-14T19:39:28", "dateReserved": "2020-01-28T00:00:00", "dateUpdated": "2024-11-15T15:30:03.757Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2013-12-23 22:55
Modified
2025-04-11 00:51
Severity ?
Summary
The GnuTLS backend in libcurl 7.21.4 through 7.33.0, when disabling digital signature verification (CURLOPT_SSL_VERIFYPEER), also disables the CURLOPT_SSL_VERIFYHOST check for CN or SAN host name fields, which makes it easier for remote attackers to spoof servers and conduct man-in-the-middle (MITM) attacks.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://curl.haxx.se/docs/adv_20131217.html | Vendor Advisory | |
secalert@redhat.com | http://www.debian.org/security/2013/dsa-2824 | ||
secalert@redhat.com | http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html | ||
secalert@redhat.com | http://www.ubuntu.com/usn/USN-2058-1 | ||
secalert@redhat.com | https://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04463322 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://curl.haxx.se/docs/adv_20131217.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2013/dsa-2824 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-2058-1 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04463322 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
debian | debian_linux | 7.0 | |
canonical | ubuntu_linux | 12.04 | |
canonical | ubuntu_linux | 12.10 | |
canonical | ubuntu_linux | 13.04 | |
canonical | ubuntu_linux | 13.10 | |
haxx | libcurl | 7.21.4 | |
haxx | libcurl | 7.21.5 | |
haxx | libcurl | 7.21.6 | |
haxx | libcurl | 7.21.7 | |
haxx | libcurl | 7.22.0 | |
haxx | libcurl | 7.23.0 | |
haxx | libcurl | 7.23.1 | |
haxx | libcurl | 7.24.0 | |
haxx | libcurl | 7.25.0 | |
haxx | libcurl | 7.26.0 | |
haxx | libcurl | 7.27.0 | |
haxx | libcurl | 7.28.0 | |
haxx | libcurl | 7.28.1 | |
haxx | libcurl | 7.29.0 | |
haxx | libcurl | 7.30.0 | |
haxx | libcurl | 7.31.0 | |
haxx | libcurl | 7.32.0 | |
haxx | libcurl | 7.33.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*", "matchCriteriaId": "F5D324C4-97C7-49D3-A809-9EAD4B690C69", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "matchCriteriaId": "E2076871-2E80-4605-A470-A41C1A8EC7EE", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*", "matchCriteriaId": "EFAA48D9-BEB4-4E49-AD50-325C262D46D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*", "matchCriteriaId": "7F61F047-129C-41A6-8A27-FFCBB8563E91", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.4:*:*:*:*:*:*:*", "matchCriteriaId": "9EAE25A0-3828-46F1-AB30-88732CBC9F38", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.5:*:*:*:*:*:*:*", "matchCriteriaId": "1533A85C-2160-445D-8787-E624AEDC5A0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.6:*:*:*:*:*:*:*", "matchCriteriaId": "D87B9393-7EA4-43DA-900C-7E840AE2D4C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.7:*:*:*:*:*:*:*", "matchCriteriaId": "7D1249E9-304F-4952-8DAB-8B79CE5E7D54", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*", "matchCriteriaId": "83FAF953-6A65-4FAB-BDB5-03B468CD1C9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*", "matchCriteriaId": "29F8FF1F-A639-4161-9366-62528AAF4C07", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.23.1:*:*:*:*:*:*:*", "matchCriteriaId": "812AB429-379A-4EDE-9664-5BC2989053F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.24.0:*:*:*:*:*:*:*", "matchCriteriaId": "13DD791F-C4BD-4456-955A-92E84082AA09", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.25.0:*:*:*:*:*:*:*", "matchCriteriaId": "4A17E442-45AA-4780-98B4-9BF764DCC1C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*", "matchCriteriaId": "F6AF544C-5F16-4434-B9FB-93B1B7318950", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*", "matchCriteriaId": "CBFD9ED9-2412-44AE-9C55-0ED03A121B23", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*", "matchCriteriaId": "67CCE31B-ABDA-4F32-BAF1-B1AD0664B3E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*", "matchCriteriaId": "9E66A332-ECD1-4452-B444-FB629022FDF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.29.0:*:*:*:*:*:*:*", "matchCriteriaId": "CDD3D599-35E9-4590-B5E0-3AF04D344695", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.30.0:*:*:*:*:*:*:*", "matchCriteriaId": "A3B6BFFB-7967-482C-9B49-4BD25C815299", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*", "matchCriteriaId": "1791BF6D-2C96-4A6E-90D4-2906A73601F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*", "matchCriteriaId": "260DD751-4145-4B75-B892-5FC932C6A305", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*", "matchCriteriaId": "EFF4AD0D-2EC5-4CE8-B6B3-2EC8ED2FF118", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The GnuTLS backend in libcurl 7.21.4 through 7.33.0, when disabling digital signature verification (CURLOPT_SSL_VERIFYPEER), also disables the CURLOPT_SSL_VERIFYHOST check for CN or SAN host name fields, which makes it easier for remote attackers to spoof servers and conduct man-in-the-middle (MITM) attacks." }, { "lang": "es", "value": "El backend de GnuTLS en libcurl 7.21.4 a 7.33.0, cuando se desactiva la verificaci\u00f3n de firmas digitales (CURLOPT_SSL_VERIFYPEER), tambi\u00e9n desactiva la comprobaci\u00f3n CURLOPT_SSL_VERIFYHOST para nombres de host CN o SAN, lo cual facilita a atacantes remotos la suplantaci\u00f3n de servidores y la ejecuci\u00f3n de ataques man-in-the-middle (MITM)." } ], "id": "CVE-2013-6422", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-12-23T22:55:02.943", "references": [ { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://curl.haxx.se/docs/adv_20131217.html" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2013/dsa-2824" }, { "source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/USN-2058-1" }, { "source": "secalert@redhat.com", "url": "https://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04463322" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://curl.haxx.se/docs/adv_20131217.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2013/dsa-2824" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-2058-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04463322" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-02-05 10:15
Modified
2025-06-27 19:24
Severity ?
Summary
When libcurl is asked to perform automatic gzip decompression of
content-encoded HTTP responses with the `CURLOPT_ACCEPT_ENCODING` option,
**using zlib 1.2.0.3 or older**, an attacker-controlled integer overflow would
make libcurl perform a buffer overflow.
References
▶ | URL | Tags | |
---|---|---|---|
2499f714-1537-4658-8207-48ae4bb9eae9 | https://curl.se/docs/CVE-2025-0725.html | Vendor Advisory | |
2499f714-1537-4658-8207-48ae4bb9eae9 | https://curl.se/docs/CVE-2025-0725.json | Vendor Advisory | |
2499f714-1537-4658-8207-48ae4bb9eae9 | https://hackerone.com/reports/2956023 | Exploit, Issue Tracking | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2025/02/05/3 | Mailing List | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2025/02/06/2 | Mailing List | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2025/02/06/4 | Mailing List | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/curl/curl/commit/76f83f0db23846e254d940ec7 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20250306-0009/ | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
netapp | hci_baseboard_management_controller | - | |
netapp | hci_h610s_firmware | - | |
netapp | hci_h610s | - | |
netapp | hci_h610c_firmware | - | |
netapp | hci_h610c | - | |
netapp | hci_h615c_firmware | - | |
netapp | hci_h615c | - | |
netapp | solidfire_\&_hci_management_node | - | |
netapp | solidfire_\&_hci_storage_node | - | |
haxx | curl | * | |
haxx | libcurl | * | |
zlib | zlib | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:hci_baseboard_management_controller:-:*:*:*:*:*:*:*", "matchCriteriaId": "C93821CF-3117-4763-8163-DD49F6D2CA8E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:hci_h610s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "910D39ED-5E36-42F2-B824-E7F4A2ED0BD7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:hci_h610s:-:*:*:*:*:*:*:*", "matchCriteriaId": "33960CC8-DC73-4E15-8A19-686F5F528006", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:hci_h610c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A9BC74D7-687D-46AA-862F-D755A3D1AA05", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:hci_h610c:-:*:*:*:*:*:*:*", "matchCriteriaId": "436851DF-1531-40CE-8C71-561978877E27", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:hci_h615c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7AEAE936-CBDA-4C3A-B139-BE9C86EC6CB7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:hci_h615c:-:*:*:*:*:*:*:*", "matchCriteriaId": "D471C87E-D861-4AC7-9418-900858C5BF24", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:solidfire_\\\u0026_hci_management_node:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6D700C5-F67F-4FFB-BE69-D524592A3D2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:solidfire_\\\u0026_hci_storage_node:-:*:*:*:*:*:*:*", "matchCriteriaId": "D452B464-1200-4B72-9A89-42DC58486191", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*", "matchCriteriaId": "34EA884B-6BF6-4F00-B302-CA48450A28D3", "versionEndExcluding": "8.12.0", "versionStartIncluding": "7.10.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*", "matchCriteriaId": "00A479A7-7885-4086-A577-C2E7E95FEADA", "versionEndExcluding": "8.12.0", "versionStartIncluding": "7.10.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:zlib:zlib:*:*:*:*:*:*:*:*", "matchCriteriaId": "5D0F980D-04BB-436F-BD57-D8626701839E", "versionEndIncluding": "1.2.0.3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "When libcurl is asked to perform automatic gzip decompression of\ncontent-encoded HTTP responses with the `CURLOPT_ACCEPT_ENCODING` option,\n**using zlib 1.2.0.3 or older**, an attacker-controlled integer overflow would\nmake libcurl perform a buffer overflow." }, { "lang": "es", "value": "Cuando se le solicita a libcurl que realice una descompresi\u00f3n gzip autom\u00e1tica de respuestas HTTP codificadas con contenido con la opci\u00f3n `CURLOPT_ACCEPT_ENCODING`, **usando zlib 1.2.0.3 o anterior**, un desbordamiento de entero controlado por un atacante har\u00eda que libcurl realice un desbordamiento de b\u00fafer." } ], "id": "CVE-2025-0725", "lastModified": "2025-06-27T19:24:08.327", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.4, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2025-02-05T10:15:22.980", "references": [ { "source": "2499f714-1537-4658-8207-48ae4bb9eae9", "tags": [ "Vendor Advisory" ], "url": "https://curl.se/docs/CVE-2025-0725.html" }, { "source": "2499f714-1537-4658-8207-48ae4bb9eae9", "tags": [ "Vendor Advisory" ], "url": "https://curl.se/docs/CVE-2025-0725.json" }, { "source": "2499f714-1537-4658-8207-48ae4bb9eae9", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://hackerone.com/reports/2956023" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "http://www.openwall.com/lists/oss-security/2025/02/05/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "http://www.openwall.com/lists/oss-security/2025/02/06/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "http://www.openwall.com/lists/oss-security/2025/02/06/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/curl/curl/commit/76f83f0db23846e254d940ec7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20250306-0009/" } ], "sourceIdentifier": "2499f714-1537-4658-8207-48ae4bb9eae9", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-120" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-01-24 22:29
Modified
2024-11-21 03:39
Severity ?
Summary
libcurl 7.49.0 to and including 7.57.0 contains an out bounds read in code handling HTTP/2 trailers. It was reported (https://github.com/curl/curl/pull/2231) that reading an HTTP/2 trailer could mess up future trailers since the stored size was one byte less than required. The problem is that the code that creates HTTP/1-like headers from the HTTP/2 trailer data once appended a string like `:` to the target buffer, while this was recently changed to `: ` (a space was added after the colon) but the following math wasn't updated correspondingly. When accessed, the data is read out of bounds and causes either a crash or that the (too large) data gets passed to client write. This could lead to a denial-of-service situation or an information disclosure if someone has a service that echoes back or uses the trailers for something.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.securitytracker.com/id/1040273 | Third Party Advisory, VDB Entry | |
cve@mitre.org | https://access.redhat.com/errata/RHSA-2019:1543 | ||
cve@mitre.org | https://curl.haxx.se/docs/adv_2018-824a.html | Patch, Vendor Advisory | |
cve@mitre.org | https://github.com/curl/curl/pull/2231 | Issue Tracking, Patch, Third Party Advisory | |
cve@mitre.org | https://usn.ubuntu.com/3554-1/ | Third Party Advisory | |
cve@mitre.org | https://www.debian.org/security/2018/dsa-4098 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1040273 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2019:1543 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://curl.haxx.se/docs/adv_2018-824a.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/curl/curl/pull/2231 | Issue Tracking, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3554-1/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2018/dsa-4098 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
haxx | libcurl | * | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 16.04 | |
canonical | ubuntu_linux | 17.10 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*", "matchCriteriaId": "11B88D2C-921D-4324-8BFD-66069D808808", "versionEndIncluding": "7.57.0", "versionStartIncluding": "7.49.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "matchCriteriaId": "9070C9D8-A14A-467F-8253-33B966C16886", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "libcurl 7.49.0 to and including 7.57.0 contains an out bounds read in code handling HTTP/2 trailers. It was reported (https://github.com/curl/curl/pull/2231) that reading an HTTP/2 trailer could mess up future trailers since the stored size was one byte less than required. The problem is that the code that creates HTTP/1-like headers from the HTTP/2 trailer data once appended a string like `:` to the target buffer, while this was recently changed to `: ` (a space was added after the colon) but the following math wasn\u0027t updated correspondingly. When accessed, the data is read out of bounds and causes either a crash or that the (too large) data gets passed to client write. This could lead to a denial-of-service situation or an information disclosure if someone has a service that echoes back or uses the trailers for something." }, { "lang": "es", "value": "libcurl 7.49.0 hasta e incluyendo la versi\u00f3n 7.57.0 contiene una lectura fuera de l\u00edmites en los trailers de manipulaci\u00f3n de c\u00f3digo HTTP/2. Se ha notificado (https://github.com/curl/curl/pull/2231) que la lectura de un trailer HTTP/2 podr\u00eda da\u00f1ar futuros trailers debido a que el tama\u00f1o almacenado era un byte menor de lo requerido. El problema es que el c\u00f3digo que crea cabeceras como HTTP/1 de los datos del trailer HTTP/2 anexaron una cadena como \":\" en el b\u00fafer objetivo, a pesar de que se hab\u00eda cambiado recientemente a \": \" (se a\u00f1adi\u00f3 un espacio despu\u00e9s de los dos puntos), pero la siguiente matem\u00e1tica no se actualiz\u00f3 debidamente. Al acceder a ellos, los datos se leen fuera de l\u00edmites y provocan o un cierre inesperado o que los datos (demasiado grandes) se pasen a escritura del cliente. Esto podr\u00eda conducir a una situaci\u00f3n de denegaci\u00f3n de servicio (DoS) o a una divulgaci\u00f3n de informaci\u00f3n si alguien tiene un servicio que devuelva ecos o que emplee los trailers para algo." } ], "id": "CVE-2018-1000005", "lastModified": "2024-11-21T03:39:24.313", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-01-24T22:29:00.307", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040273" }, { "source": "cve@mitre.org", "url": "https://access.redhat.com/errata/RHSA-2019:1543" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://curl.haxx.se/docs/adv_2018-824a.html" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/curl/curl/pull/2231" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3554-1/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4098" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040273" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2019:1543" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://curl.haxx.se/docs/adv_2018-824a.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/curl/curl/pull/2231" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3554-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4098" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-11-29 18:29
Modified
2025-04-20 01:37
Severity ?
Summary
The FTP wildcard function in curl and libcurl before 7.57.0 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) or possibly have unspecified other impact via a string that ends with an '[' character.
References
▶ | URL | Tags | |
---|---|---|---|
security@debian.org | http://security.cucumberlinux.com/security/details.php?id=162 | Third Party Advisory | |
security@debian.org | http://www.securityfocus.com/bid/102057 | Third Party Advisory, VDB Entry | |
security@debian.org | http://www.securitytracker.com/id/1039897 | Third Party Advisory, VDB Entry | |
security@debian.org | https://access.redhat.com/errata/RHSA-2018:3558 | ||
security@debian.org | https://curl.haxx.se/docs/adv_2017-ae72.html | Mitigation, Vendor Advisory | |
security@debian.org | https://lists.debian.org/debian-lts-announce/2017/11/msg00040.html | ||
security@debian.org | https://security.gentoo.org/glsa/201712-04 | ||
security@debian.org | https://www.debian.org/security/2017/dsa-4051 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://security.cucumberlinux.com/security/details.php?id=162 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/102057 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1039897 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:3558 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://curl.haxx.se/docs/adv_2017-ae72.html | Mitigation, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2017/11/msg00040.html | ||
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/201712-04 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2017/dsa-4051 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
haxx | curl | * | |
haxx | libcurl | * | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*", "matchCriteriaId": "3BCB2317-5B06-4816-A663-6BFF785F85DA", "versionEndIncluding": "7.56.1", "versionStartIncluding": "7.21.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*", "matchCriteriaId": "49BD7E26-FEED-44B0-A752-DD768B42447D", "versionEndIncluding": "7.56.1", "versionStartExcluding": "7.21.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The FTP wildcard function in curl and libcurl before 7.57.0 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) or possibly have unspecified other impact via a string that ends with an \u0027[\u0027 character." }, { "lang": "es", "value": "La funci\u00f3n FTP wildcard en curl y libcurl en versiones anteriores a la 7.57.0 permite que atacantes remotos provoquen una denegaci\u00f3n de servicio (lectura fuera de l\u00edmites y cierre inesperado de aplicaci\u00f3n) o, probablemente, causen cualquier otro tipo de impacto mediante una cadena que termina con un car\u00e1cter \"[\"." } ], "id": "CVE-2017-8817", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-11-29T18:29:00.347", "references": [ { "source": "security@debian.org", "tags": [ "Third Party Advisory" ], "url": "http://security.cucumberlinux.com/security/details.php?id=162" }, { "source": "security@debian.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/102057" }, { "source": "security@debian.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039897" }, { "source": "security@debian.org", "url": "https://access.redhat.com/errata/RHSA-2018:3558" }, { "source": "security@debian.org", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://curl.haxx.se/docs/adv_2017-ae72.html" }, { "source": "security@debian.org", "url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00040.html" }, { "source": "security@debian.org", "url": "https://security.gentoo.org/glsa/201712-04" }, { "source": "security@debian.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2017/dsa-4051" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://security.cucumberlinux.com/security/details.php?id=162" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/102057" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039897" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2018:3558" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://curl.haxx.se/docs/adv_2017-ae72.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00040.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201712-04" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2017/dsa-4051" } ], "sourceIdentifier": "security@debian.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-11-23 11:55
Modified
2025-04-11 00:51
Severity ?
Summary
cURL and libcurl 7.18.0 through 7.32.0, when built with OpenSSL, disables the certificate CN and SAN name field verification (CURLOPT_SSL_VERIFYHOST) when the digital signature verification (CURLOPT_SSL_VERIFYPEER) is disabled, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://curl.haxx.se/docs/adv_20131115.html | Vendor Advisory | |
secalert@redhat.com | http://lists.opensuse.org/opensuse-updates/2013-12/msg00047.html | ||
secalert@redhat.com | http://lists.opensuse.org/opensuse-updates/2013-12/msg00053.html | ||
secalert@redhat.com | http://www.debian.org/security/2013/dsa-2798 | ||
secalert@redhat.com | http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html | ||
secalert@redhat.com | http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html | ||
secalert@redhat.com | http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html | ||
secalert@redhat.com | http://www.ubuntu.com/usn/USN-2048-1 | ||
secalert@redhat.com | https://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04463322 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://curl.haxx.se/docs/adv_20131115.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-updates/2013-12/msg00047.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-updates/2013-12/msg00053.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2013/dsa-2798 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-2048-1 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04463322 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
haxx | curl | 7.18.0 | |
haxx | curl | 7.18.1 | |
haxx | curl | 7.18.2 | |
haxx | curl | 7.19.0 | |
haxx | curl | 7.19.1 | |
haxx | curl | 7.19.2 | |
haxx | curl | 7.19.3 | |
haxx | curl | 7.19.4 | |
haxx | curl | 7.19.5 | |
haxx | curl | 7.19.6 | |
haxx | curl | 7.19.7 | |
haxx | curl | 7.20.0 | |
haxx | curl | 7.20.1 | |
haxx | curl | 7.21.0 | |
haxx | curl | 7.21.1 | |
haxx | curl | 7.21.2 | |
haxx | curl | 7.21.3 | |
haxx | curl | 7.21.4 | |
haxx | curl | 7.21.5 | |
haxx | curl | 7.21.6 | |
haxx | curl | 7.21.7 | |
haxx | curl | 7.22.0 | |
haxx | curl | 7.23.0 | |
haxx | curl | 7.23.1 | |
haxx | curl | 7.24.0 | |
haxx | curl | 7.25.0 | |
haxx | curl | 7.26.0 | |
haxx | curl | 7.27.0 | |
haxx | curl | 7.28.0 | |
haxx | curl | 7.28.1 | |
haxx | curl | 7.29.0 | |
haxx | curl | 7.30.0 | |
haxx | curl | 7.31.0 | |
haxx | curl | 7.32.0 | |
haxx | libcurl | 7.18.0 | |
haxx | libcurl | 7.18.1 | |
haxx | libcurl | 7.18.2 | |
haxx | libcurl | 7.19.0 | |
haxx | libcurl | 7.19.1 | |
haxx | libcurl | 7.19.2 | |
haxx | libcurl | 7.19.3 | |
haxx | libcurl | 7.19.4 | |
haxx | libcurl | 7.19.5 | |
haxx | libcurl | 7.19.6 | |
haxx | libcurl | 7.19.7 | |
haxx | libcurl | 7.20.0 | |
haxx | libcurl | 7.20.1 | |
haxx | libcurl | 7.21.0 | |
haxx | libcurl | 7.21.1 | |
haxx | libcurl | 7.21.2 | |
haxx | libcurl | 7.21.3 | |
haxx | libcurl | 7.21.4 | |
haxx | libcurl | 7.21.5 | |
haxx | libcurl | 7.21.6 | |
haxx | libcurl | 7.21.7 | |
haxx | libcurl | 7.22.0 | |
haxx | libcurl | 7.23.0 | |
haxx | libcurl | 7.23.1 | |
haxx | libcurl | 7.24.0 | |
haxx | libcurl | 7.25.0 | |
haxx | libcurl | 7.26.0 | |
haxx | libcurl | 7.27.0 | |
haxx | libcurl | 7.28.0 | |
haxx | libcurl | 7.28.1 | |
haxx | libcurl | 7.29.0 | |
haxx | libcurl | 7.30.0 | |
haxx | libcurl | 7.31.0 | |
haxx | libcurl | 7.32.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:haxx:curl:7.18.0:*:*:*:*:*:*:*", "matchCriteriaId": "7494C01F-E9EC-406E-879A-B2045865E282", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.18.1:*:*:*:*:*:*:*", "matchCriteriaId": "7DD9F894-4576-4ED1-9F55-4C27ECE7E058", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.18.2:*:*:*:*:*:*:*", "matchCriteriaId": "49AFACAC-BBAF-469B-BF05-0478E987120F", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.19.0:*:*:*:*:*:*:*", "matchCriteriaId": "6A136E86-0697-4915-BC49-F570C776EDE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.19.1:*:*:*:*:*:*:*", "matchCriteriaId": "ECB241AF-A01D-4FD6-B98A-F4C20F844C2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.19.2:*:*:*:*:*:*:*", "matchCriteriaId": "C5B61901-F7DF-4805-8EB7-CA1701CA81CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.19.3:*:*:*:*:*:*:*", "matchCriteriaId": "EB0CDEC9-224A-4668-B2E4-2145653E3F2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.19.4:*:*:*:*:*:*:*", "matchCriteriaId": "E92BE9CB-F001-47A0-94E0-48FC01A63FE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.19.5:*:*:*:*:*:*:*", "matchCriteriaId": "324E2A20-2F66-4E03-9A7F-A09E631E9033", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.19.6:*:*:*:*:*:*:*", "matchCriteriaId": "C8987B53-BD80-40B9-8429-21AD97208040", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.19.7:*:*:*:*:*:*:*", "matchCriteriaId": "490D1BDC-33B9-43BA-B6DA-42DEE577082A", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "B465BE7E-0B4D-4BC4-894B-3F51A201CE91", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.20.1:*:*:*:*:*:*:*", "matchCriteriaId": "CAA17087-3021-4961-B53C-CDCC872A31A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.21.0:*:*:*:*:*:*:*", "matchCriteriaId": "E5CA3936-4602-40E6-B75C-58D3F24268E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.21.1:*:*:*:*:*:*:*", "matchCriteriaId": "D87C110C-21DD-438A-90EF-BE516CF59F3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.21.2:*:*:*:*:*:*:*", "matchCriteriaId": "AD2D9E0E-2EED-4FB5-859C-05226FC48D7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.21.3:*:*:*:*:*:*:*", "matchCriteriaId": "7CA01E21-71CE-4B07-B5A6-D0D7AC493A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.21.4:*:*:*:*:*:*:*", "matchCriteriaId": "51239254-31CE-4BF7-8669-1525BA391362", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.21.5:*:*:*:*:*:*:*", "matchCriteriaId": "2E2BE20D-232D-4C86-81B0-C82CCC1CAA62", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.21.6:*:*:*:*:*:*:*", "matchCriteriaId": "D652FD7C-1521-4391-AAE1-0A4D6F4CE8F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.21.7:*:*:*:*:*:*:*", "matchCriteriaId": "DB861143-F809-45CF-95BE-E64F4BA1A0DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.22.0:*:*:*:*:*:*:*", "matchCriteriaId": "E3480F4A-0AE0-4428-9EDA-5A6B994909A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.23.0:*:*:*:*:*:*:*", "matchCriteriaId": "936BF59E-33A8-46BA-9FBD-8763812E2F10", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.23.1:*:*:*:*:*:*:*", "matchCriteriaId": "33168C81-6DAE-40D6-9693-68390CD71DA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.24.0:*:*:*:*:*:*:*", "matchCriteriaId": "424F9604-AA9A-4D45-A521-0BDEDB723659", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.25.0:*:*:*:*:*:*:*", "matchCriteriaId": "DC6EBCEB-E52C-4FF5-B15A-6960F58090EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.26.0:*:*:*:*:*:*:*", "matchCriteriaId": "D204E994-4591-403C-8EF3-D3B7BF4AA1A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.27.0:*:*:*:*:*:*:*", "matchCriteriaId": "EBF5418D-1162-4B1E-BC3D-06A3E084BEFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.28.0:*:*:*:*:*:*:*", "matchCriteriaId": "1CA65F31-3D54-4F66-A0A3-2BD993FF38F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.28.1:*:*:*:*:*:*:*", "matchCriteriaId": "41ACC9FE-62FF-424B-B4B8-B033FEAF7686", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.29.0:*:*:*:*:*:*:*", "matchCriteriaId": "F8BC39E9-5945-4DC8-ACA8-1C9918D9F279", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.30.0:*:*:*:*:*:*:*", "matchCriteriaId": "B9658447-FBB0-4DEA-8FEE-BD4D3D1BF7FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.31.0:*:*:*:*:*:*:*", "matchCriteriaId": "5ECABFCB-0D02-4B5B-BB35-C6B3C0896348", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.32.0:*:*:*:*:*:*:*", "matchCriteriaId": "5A5176F0-E62F-46FF-B536-DC0680696773", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*", "matchCriteriaId": "EEA3D88B-41B9-4D79-B47D-B3D6058C0C27", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.18.1:*:*:*:*:*:*:*", "matchCriteriaId": "C2C80901-D48E-4C2A-9BED-A40007A11C97", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*", "matchCriteriaId": "331A51E4-AA73-486F-9618-5A83965F2436", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.0:*:*:*:*:*:*:*", "matchCriteriaId": "EB32DF2C-9208-4853-ADEB-B00D764D7467", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.1:*:*:*:*:*:*:*", "matchCriteriaId": "E05636DC-7E38-4605-AAB8-81C0AE37520A", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.2:*:*:*:*:*:*:*", "matchCriteriaId": "624DF2F1-53FD-48D3-B93D-44E99C9C0C5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*", "matchCriteriaId": "F2171C7C-311A-4405-B95F-3A54966FA844", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.4:*:*:*:*:*:*:*", "matchCriteriaId": "5DE20A41-8B53-46FC-9002-69CC7495171F", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.5:*:*:*:*:*:*:*", "matchCriteriaId": "87ED9DA0-E880-4CBB-B1AC-5AEE8A004718", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.6:*:*:*:*:*:*:*", "matchCriteriaId": "5293C7F0-BF9F-4768-889A-876CE78903CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.7:*:*:*:*:*:*:*", "matchCriteriaId": "F3EB41B3-65F3-4B0E-8CCC-325B14AF605B", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "857B244C-2AFB-40C7-A893-7C6DE9871BCE", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.20.1:*:*:*:*:*:*:*", "matchCriteriaId": "B732CE55-820A-40E0-A885-71BBB6CF8C15", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.0:*:*:*:*:*:*:*", "matchCriteriaId": "0455A5F2-1515-4CD8-BA2F-74D28E91A661", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.1:*:*:*:*:*:*:*", "matchCriteriaId": "29034B3A-BE9D-4D68-8C56-4465C03C3693", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*", "matchCriteriaId": "6249538E-FBCB-4130-91FB-DA78D7BA45DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.3:*:*:*:*:*:*:*", "matchCriteriaId": "5E11B8A5-50A2-468F-BFB3-86DD9D28AC73", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.4:*:*:*:*:*:*:*", "matchCriteriaId": "9EAE25A0-3828-46F1-AB30-88732CBC9F38", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.5:*:*:*:*:*:*:*", "matchCriteriaId": "1533A85C-2160-445D-8787-E624AEDC5A0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.6:*:*:*:*:*:*:*", "matchCriteriaId": "D87B9393-7EA4-43DA-900C-7E840AE2D4C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.7:*:*:*:*:*:*:*", "matchCriteriaId": "7D1249E9-304F-4952-8DAB-8B79CE5E7D54", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*", "matchCriteriaId": "83FAF953-6A65-4FAB-BDB5-03B468CD1C9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*", "matchCriteriaId": "29F8FF1F-A639-4161-9366-62528AAF4C07", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.23.1:*:*:*:*:*:*:*", "matchCriteriaId": "812AB429-379A-4EDE-9664-5BC2989053F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.24.0:*:*:*:*:*:*:*", "matchCriteriaId": "13DD791F-C4BD-4456-955A-92E84082AA09", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.25.0:*:*:*:*:*:*:*", "matchCriteriaId": "4A17E442-45AA-4780-98B4-9BF764DCC1C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*", "matchCriteriaId": "F6AF544C-5F16-4434-B9FB-93B1B7318950", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*", "matchCriteriaId": "CBFD9ED9-2412-44AE-9C55-0ED03A121B23", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*", "matchCriteriaId": "67CCE31B-ABDA-4F32-BAF1-B1AD0664B3E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*", "matchCriteriaId": "9E66A332-ECD1-4452-B444-FB629022FDF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.29.0:*:*:*:*:*:*:*", "matchCriteriaId": "CDD3D599-35E9-4590-B5E0-3AF04D344695", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.30.0:*:*:*:*:*:*:*", "matchCriteriaId": "A3B6BFFB-7967-482C-9B49-4BD25C815299", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*", "matchCriteriaId": "1791BF6D-2C96-4A6E-90D4-2906A73601F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*", "matchCriteriaId": "260DD751-4145-4B75-B892-5FC932C6A305", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "cURL and libcurl 7.18.0 through 7.32.0, when built with OpenSSL, disables the certificate CN and SAN name field verification (CURLOPT_SSL_VERIFYHOST) when the digital signature verification (CURLOPT_SSL_VERIFYPEER) is disabled, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate." }, { "lang": "es", "value": "cURL y libcurl 7.18.0 hasta la versi\u00f3n 7.32.0, cuando es compilado con OpenSSL, desactiva la verificaci\u00f3n del nombre de campos del certificado CN y SAN (CURLOPT_SSL_VERIFYHOST) cuando la verificaci\u00f3n de firma digital (CURLOPT_SSL_VERIFYPEER) est\u00e1 desactivada, lo que permite a atacantes man-in-the-middle falsificar servidores SSL a trav\u00e9s de un certificado v\u00e1lido arbitrario." } ], "id": "CVE-2013-4545", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-11-23T11:55:04.740", "references": [ { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://curl.haxx.se/docs/adv_20131115.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00047.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00053.html" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2013/dsa-2798" }, { "source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html" }, { "source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html" }, { "source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/USN-2048-1" }, { "source": "secalert@redhat.com", "url": "https://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04463322" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://curl.haxx.se/docs/adv_20131115.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00047.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00053.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2013/dsa-2798" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-2048-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04463322" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-310" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-04-18 22:14
Modified
2025-04-12 10:46
Severity ?
Summary
curl and libcurl 7.27.0 through 7.35.0, when running on Windows and using the SChannel/Winssl TLS backend, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate when accessing a URL that uses a numerical IP address, which allows man-in-the-middle attackers to spoof servers via an arbitrary valid certificate.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://curl.haxx.se/docs/adv_20140326D.html | Patch, Vendor Advisory | |
cve@mitre.org | http://seclists.org/oss-sec/2014/q1/585 | ||
cve@mitre.org | http://seclists.org/oss-sec/2014/q1/586 | ||
cve@mitre.org | http://secunia.com/advisories/57836 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/57966 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/57968 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/59458 | ||
cve@mitre.org | http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095862 | ||
cve@mitre.org | http://www.getchef.com/blog/2014/04/09/chef-server-11-0-12-release/ | ||
cve@mitre.org | http://www.getchef.com/blog/2014/04/09/enterprise-chef-1-4-9-release/ | ||
cve@mitre.org | http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/ | ||
cve@mitre.org | http://www.securityfocus.com/bid/66296 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://curl.haxx.se/docs/adv_20140326D.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/oss-sec/2014/q1/585 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/oss-sec/2014/q1/586 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/57836 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/57966 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/57968 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/59458 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095862 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.getchef.com/blog/2014/04/09/chef-server-11-0-12-release/ | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.getchef.com/blog/2014/04/09/enterprise-chef-1-4-9-release/ | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/ | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/66296 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
haxx | curl | 7.27.0 | |
haxx | curl | 7.28.0 | |
haxx | curl | 7.28.1 | |
haxx | curl | 7.29.0 | |
haxx | curl | 7.30.0 | |
haxx | curl | 7.31.0 | |
haxx | curl | 7.32.0 | |
haxx | curl | 7.33.0 | |
haxx | curl | 7.34.0 | |
haxx | curl | 7.35.0 | |
haxx | libcurl | 7.27.0 | |
haxx | libcurl | 7.28.0 | |
haxx | libcurl | 7.28.1 | |
haxx | libcurl | 7.29.0 | |
haxx | libcurl | 7.30.0 | |
haxx | libcurl | 7.31.0 | |
haxx | libcurl | 7.32.0 | |
haxx | libcurl | 7.33.0 | |
haxx | libcurl | 7.34.0 | |
haxx | libcurl | 7.35.0 | |
haxx | libcurl | 7.36.0 | |
microsoft | windows | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:haxx:curl:7.27.0:*:*:*:*:*:*:*", "matchCriteriaId": "EBF5418D-1162-4B1E-BC3D-06A3E084BEFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.28.0:*:*:*:*:*:*:*", "matchCriteriaId": "1CA65F31-3D54-4F66-A0A3-2BD993FF38F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.28.1:*:*:*:*:*:*:*", "matchCriteriaId": "41ACC9FE-62FF-424B-B4B8-B033FEAF7686", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.29.0:*:*:*:*:*:*:*", "matchCriteriaId": "F8BC39E9-5945-4DC8-ACA8-1C9918D9F279", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.30.0:*:*:*:*:*:*:*", "matchCriteriaId": "B9658447-FBB0-4DEA-8FEE-BD4D3D1BF7FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.31.0:*:*:*:*:*:*:*", "matchCriteriaId": "5ECABFCB-0D02-4B5B-BB35-C6B3C0896348", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.32.0:*:*:*:*:*:*:*", "matchCriteriaId": "5A5176F0-E62F-46FF-B536-DC0680696773", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.33.0:*:*:*:*:*:*:*", "matchCriteriaId": "506A3761-3D24-43DB-88D8-4EB5B9E8BA5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.34.0:*:*:*:*:*:*:*", "matchCriteriaId": "0B6EF8B0-0E86-449C-A500-ACD902A78C7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.35.0:*:*:*:*:*:*:*", "matchCriteriaId": "4D558CC2-0146-4887-834E-19FCB1D512A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*", "matchCriteriaId": "CBFD9ED9-2412-44AE-9C55-0ED03A121B23", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*", "matchCriteriaId": "67CCE31B-ABDA-4F32-BAF1-B1AD0664B3E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*", "matchCriteriaId": "9E66A332-ECD1-4452-B444-FB629022FDF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.29.0:*:*:*:*:*:*:*", "matchCriteriaId": "CDD3D599-35E9-4590-B5E0-3AF04D344695", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.30.0:*:*:*:*:*:*:*", "matchCriteriaId": "A3B6BFFB-7967-482C-9B49-4BD25C815299", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*", "matchCriteriaId": "1791BF6D-2C96-4A6E-90D4-2906A73601F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*", "matchCriteriaId": "260DD751-4145-4B75-B892-5FC932C6A305", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*", "matchCriteriaId": "EFF4AD0D-2EC5-4CE8-B6B3-2EC8ED2FF118", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*", "matchCriteriaId": "3EB1CB85-0A9B-4816-B471-278774EE6D4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*", "matchCriteriaId": "3831AB03-4E7E-476D-9623-58AADC188DFE", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*", "matchCriteriaId": "ABACE305-2F0C-4B59-BC5C-6DF162B450E4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "curl and libcurl 7.27.0 through 7.35.0, when running on Windows and using the SChannel/Winssl TLS backend, does not verify that the server hostname matches a domain name in the subject\u0027s Common Name (CN) or subjectAltName field of the X.509 certificate when accessing a URL that uses a numerical IP address, which allows man-in-the-middle attackers to spoof servers via an arbitrary valid certificate." }, { "lang": "es", "value": "curl y libcurl versiones 7.27.0 hasta 7.35.0, cuando se ejecuta en Windows y utiliza el backend TLS SChannel/Winssl, no comprueba que el nombre de host del servidor coincida con un nombre de dominio en el campo subject\u0027s Common Name (CN) o subjectAltName del certificado X.509 cuando se accede a una URL que usa una direcci\u00f3n IP num\u00e9rica, que permite a los atacantes de tipo man-in-the-middle falsificar servidores por medio de un certificado v\u00e1lido arbitrario." } ], "id": "CVE-2014-2522", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-04-18T22:14:38.587", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://curl.haxx.se/docs/adv_20140326D.html" }, { "source": "cve@mitre.org", "url": "http://seclists.org/oss-sec/2014/q1/585" }, { "source": "cve@mitre.org", "url": "http://seclists.org/oss-sec/2014/q1/586" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/57836" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/57966" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/57968" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/59458" }, { "source": "cve@mitre.org", "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095862" }, { "source": "cve@mitre.org", "url": "http://www.getchef.com/blog/2014/04/09/chef-server-11-0-12-release/" }, { "source": "cve@mitre.org", "url": "http://www.getchef.com/blog/2014/04/09/enterprise-chef-1-4-9-release/" }, { "source": "cve@mitre.org", "url": "http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/66296" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://curl.haxx.se/docs/adv_20140326D.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/oss-sec/2014/q1/585" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/oss-sec/2014/q1/586" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/57836" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/57966" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/57968" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/59458" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095862" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.getchef.com/blog/2014/04/09/chef-server-11-0-12-release/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.getchef.com/blog/2014/04/09/enterprise-chef-1-4-9-release/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/66296" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-11-15 20:59
Modified
2025-04-12 10:46
Severity ?
Summary
The curl_easy_duphandle function in libcurl 7.17.1 through 7.38.0, when running with the CURLOPT_COPYPOSTFIELDS option, does not properly copy HTTP POST data for an easy handle, which triggers an out-of-bounds read that allows remote web servers to read sensitive memory information.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://curl.haxx.se/docs/adv_20141105.html | Vendor Advisory | |
secalert@redhat.com | http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743 | ||
secalert@redhat.com | http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html | Mailing List, Third Party Advisory | |
secalert@redhat.com | http://lists.opensuse.org/opensuse-updates/2015-02/msg00040.html | Third Party Advisory | |
secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2015-1254.html | ||
secalert@redhat.com | http://www.debian.org/security/2014/dsa-3069 | Third Party Advisory | |
secalert@redhat.com | http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html | ||
secalert@redhat.com | http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html | Vendor Advisory | |
secalert@redhat.com | http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html | Vendor Advisory | |
secalert@redhat.com | http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html | ||
secalert@redhat.com | http://www.securityfocus.com/bid/70988 | ||
secalert@redhat.com | http://www.ubuntu.com/usn/USN-2399-1 | Third Party Advisory | |
secalert@redhat.com | https://support.apple.com/kb/HT205031 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://curl.haxx.se/docs/adv_20141105.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-updates/2015-02/msg00040.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2015-1254.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2014/dsa-3069 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/70988 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-2399-1 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT205031 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
canonical | ubuntu_linux | 10.04 | |
canonical | ubuntu_linux | 12.04 | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 14.10 | |
apple | mac_os_x | 10.10.0 | |
apple | mac_os_x | 10.10.1 | |
apple | mac_os_x | 10.10.2 | |
apple | mac_os_x | 10.10.3 | |
apple | mac_os_x | 10.10.4 | |
opensuse | opensuse | 13.1 | |
opensuse | opensuse | 13.2 | |
oracle | hyperion | 11.1.2.2 | |
oracle | hyperion | 11.1.2.3 | |
debian | debian_linux | 7.0 | |
debian | debian_linux | 8.0 | |
haxx | libcurl | 7.17.1 | |
haxx | libcurl | 7.18.0 | |
haxx | libcurl | 7.18.1 | |
haxx | libcurl | 7.18.2 | |
haxx | libcurl | 7.19.0 | |
haxx | libcurl | 7.19.1 | |
haxx | libcurl | 7.19.2 | |
haxx | libcurl | 7.19.3 | |
haxx | libcurl | 7.19.4 | |
haxx | libcurl | 7.19.5 | |
haxx | libcurl | 7.19.6 | |
haxx | libcurl | 7.19.7 | |
haxx | libcurl | 7.20.0 | |
haxx | libcurl | 7.20.1 | |
haxx | libcurl | 7.21.0 | |
haxx | libcurl | 7.21.1 | |
haxx | libcurl | 7.21.2 | |
haxx | libcurl | 7.21.3 | |
haxx | libcurl | 7.21.4 | |
haxx | libcurl | 7.21.5 | |
haxx | libcurl | 7.21.6 | |
haxx | libcurl | 7.21.7 | |
haxx | libcurl | 7.22.0 | |
haxx | libcurl | 7.23.0 | |
haxx | libcurl | 7.23.1 | |
haxx | libcurl | 7.24.0 | |
haxx | libcurl | 7.25.0 | |
haxx | libcurl | 7.26.0 | |
haxx | libcurl | 7.27.0 | |
haxx | libcurl | 7.28.0 | |
haxx | libcurl | 7.28.1 | |
haxx | libcurl | 7.29.0 | |
haxx | libcurl | 7.30.0 | |
haxx | libcurl | 7.31.0 | |
haxx | libcurl | 7.32.0 | |
haxx | libcurl | 7.33.0 | |
haxx | libcurl | 7.34.0 | |
haxx | libcurl | 7.35.0 | |
haxx | libcurl | 7.36.0 | |
haxx | libcurl | 7.37.0 | |
haxx | libcurl | 7.37.1 | |
haxx | libcurl | 7.38.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*", "matchCriteriaId": "5D37DF0F-F863-45AC-853A-3E04F9FEC7CA", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*", "matchCriteriaId": "49A63F39-30BE-443F-AF10-6245587D3359", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:10.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "C8A2286E-9D1C-4B56-8B40-150201B818AF", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "0AF9BC68-7F0D-4DF9-9CD8-6CE9844555C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.10.2:*:*:*:*:*:*:*", "matchCriteriaId": "D35FAC77-A0DD-4AF9-AA9E-A4B170842D2D", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.10.3:*:*:*:*:*:*:*", "matchCriteriaId": "831B1114-7CA7-43E3-9A15-592218060A1F", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.10.4:*:*:*:*:*:*:*", "matchCriteriaId": "E8B0A12E-E122-4189-A05E-4FEA43C19876", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "matchCriteriaId": "A10BC294-9196-425F-9FB0-B1625465B47F", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "matchCriteriaId": "03117DF1-3BEC-4B8D-AD63-DBBDB2126081", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:hyperion:11.1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "74DA49AC-B255-470A-839D-210EA929AB96", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:hyperion:11.1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "9D31D1BC-B017-4464-A0E3-84C2F20887C3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*", "matchCriteriaId": "08C8EE1E-E186-42D6-8B12-05865C73F261", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*", "matchCriteriaId": "EEA3D88B-41B9-4D79-B47D-B3D6058C0C27", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.18.1:*:*:*:*:*:*:*", "matchCriteriaId": "C2C80901-D48E-4C2A-9BED-A40007A11C97", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*", "matchCriteriaId": "331A51E4-AA73-486F-9618-5A83965F2436", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.0:*:*:*:*:*:*:*", "matchCriteriaId": "EB32DF2C-9208-4853-ADEB-B00D764D7467", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.1:*:*:*:*:*:*:*", "matchCriteriaId": "E05636DC-7E38-4605-AAB8-81C0AE37520A", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.2:*:*:*:*:*:*:*", "matchCriteriaId": "624DF2F1-53FD-48D3-B93D-44E99C9C0C5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*", "matchCriteriaId": "F2171C7C-311A-4405-B95F-3A54966FA844", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.4:*:*:*:*:*:*:*", "matchCriteriaId": "5DE20A41-8B53-46FC-9002-69CC7495171F", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.5:*:*:*:*:*:*:*", "matchCriteriaId": "87ED9DA0-E880-4CBB-B1AC-5AEE8A004718", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.6:*:*:*:*:*:*:*", "matchCriteriaId": "5293C7F0-BF9F-4768-889A-876CE78903CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.7:*:*:*:*:*:*:*", "matchCriteriaId": "F3EB41B3-65F3-4B0E-8CCC-325B14AF605B", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "857B244C-2AFB-40C7-A893-7C6DE9871BCE", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.20.1:*:*:*:*:*:*:*", "matchCriteriaId": "B732CE55-820A-40E0-A885-71BBB6CF8C15", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.0:*:*:*:*:*:*:*", "matchCriteriaId": "0455A5F2-1515-4CD8-BA2F-74D28E91A661", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.1:*:*:*:*:*:*:*", "matchCriteriaId": "29034B3A-BE9D-4D68-8C56-4465C03C3693", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*", "matchCriteriaId": "6249538E-FBCB-4130-91FB-DA78D7BA45DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.3:*:*:*:*:*:*:*", "matchCriteriaId": "5E11B8A5-50A2-468F-BFB3-86DD9D28AC73", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.4:*:*:*:*:*:*:*", "matchCriteriaId": "9EAE25A0-3828-46F1-AB30-88732CBC9F38", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.5:*:*:*:*:*:*:*", "matchCriteriaId": "1533A85C-2160-445D-8787-E624AEDC5A0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.6:*:*:*:*:*:*:*", "matchCriteriaId": "D87B9393-7EA4-43DA-900C-7E840AE2D4C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.7:*:*:*:*:*:*:*", "matchCriteriaId": "7D1249E9-304F-4952-8DAB-8B79CE5E7D54", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*", "matchCriteriaId": "83FAF953-6A65-4FAB-BDB5-03B468CD1C9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*", "matchCriteriaId": "29F8FF1F-A639-4161-9366-62528AAF4C07", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.23.1:*:*:*:*:*:*:*", "matchCriteriaId": "812AB429-379A-4EDE-9664-5BC2989053F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.24.0:*:*:*:*:*:*:*", "matchCriteriaId": "13DD791F-C4BD-4456-955A-92E84082AA09", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.25.0:*:*:*:*:*:*:*", "matchCriteriaId": "4A17E442-45AA-4780-98B4-9BF764DCC1C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*", "matchCriteriaId": "F6AF544C-5F16-4434-B9FB-93B1B7318950", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*", "matchCriteriaId": "CBFD9ED9-2412-44AE-9C55-0ED03A121B23", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*", "matchCriteriaId": "67CCE31B-ABDA-4F32-BAF1-B1AD0664B3E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*", "matchCriteriaId": "9E66A332-ECD1-4452-B444-FB629022FDF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.29.0:*:*:*:*:*:*:*", "matchCriteriaId": "CDD3D599-35E9-4590-B5E0-3AF04D344695", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.30.0:*:*:*:*:*:*:*", "matchCriteriaId": "A3B6BFFB-7967-482C-9B49-4BD25C815299", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*", "matchCriteriaId": "1791BF6D-2C96-4A6E-90D4-2906A73601F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*", "matchCriteriaId": "260DD751-4145-4B75-B892-5FC932C6A305", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*", "matchCriteriaId": "EFF4AD0D-2EC5-4CE8-B6B3-2EC8ED2FF118", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*", "matchCriteriaId": "3EB1CB85-0A9B-4816-B471-278774EE6D4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*", "matchCriteriaId": "3831AB03-4E7E-476D-9623-58AADC188DFE", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*", "matchCriteriaId": "ABACE305-2F0C-4B59-BC5C-6DF162B450E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*", "matchCriteriaId": "6FAC1B55-F492-484E-B837-E7745682DE0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.37.1:*:*:*:*:*:*:*", "matchCriteriaId": "E0D57914-B40A-462B-9C78-6433BE2B2DB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.38.0:*:*:*:*:*:*:*", "matchCriteriaId": "A9A12DF7-62C5-46AD-9236-E2821C64156E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The curl_easy_duphandle function in libcurl 7.17.1 through 7.38.0, when running with the CURLOPT_COPYPOSTFIELDS option, does not properly copy HTTP POST data for an easy handle, which triggers an out-of-bounds read that allows remote web servers to read sensitive memory information." }, { "lang": "es", "value": "La funci\u00f3n curl_easy_duphandle en libcurl 7.17.1 hasta 7.38.0, cuando se ejecuta con la opci\u00f3n CURLOPT_COPYPOSTFIELDS, no copia debidamente datos HTTP POST para un manejo sencillo, lo que provoca una lectura fuera de rango que permite a servidores web remotos leer informaci\u00f3n sensible de la memoria." } ], "id": "CVE-2014-3707", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-11-15T20:59:00.140", "references": [ { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://curl.haxx.se/docs/adv_20141105.html" }, { "source": "secalert@redhat.com", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10743" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00040.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2015-1254.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2014/dsa-3069" }, { "source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html" }, { "source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/70988" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2399-1" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT205031" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://curl.haxx.se/docs/adv_20141105.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10743" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00040.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2015-1254.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2014/dsa-3069" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/70988" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2399-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT205031" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-07-24 08:15
Modified
2024-11-21 09:50
Severity ?
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
3.1 (Low) - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
3.1 (Low) - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
Summary
libcurl's URL API function
[curl_url_get()](https://curl.se/libcurl/c/curl_url_get.html) offers punycode
conversions, to and from IDN. Asking to convert a name that is exactly 256
bytes, libcurl ends up reading outside of a stack based buffer when built to
use the *macidn* IDN backend. The conversion function then fills up the
provided buffer exactly - but does not null terminate the string.
This flaw can lead to stack contents accidently getting returned as part of
the converted string.
References
▶ | URL | Tags | |
---|---|---|---|
2499f714-1537-4658-8207-48ae4bb9eae9 | http://www.openwall.com/lists/oss-security/2024/07/24/2 | Mailing List, Third Party Advisory | |
2499f714-1537-4658-8207-48ae4bb9eae9 | https://curl.se/docs/CVE-2024-6874.html | Vendor Advisory | |
2499f714-1537-4658-8207-48ae4bb9eae9 | https://curl.se/docs/CVE-2024-6874.json | Vendor Advisory | |
2499f714-1537-4658-8207-48ae4bb9eae9 | https://hackerone.com/reports/2604391 | Exploit, Issue Tracking, Technical Description | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2024/07/24/2 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://curl.se/docs/CVE-2024-6874.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://curl.se/docs/CVE-2024-6874.json | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://hackerone.com/reports/2604391 | Exploit, Issue Tracking, Technical Description | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20240822-0004/ |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:haxx:libcurl:8.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "759E33B7-1F1E-4050-A400-A2176BF35469", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "libcurl\u0027s URL API function\n[curl_url_get()](https://curl.se/libcurl/c/curl_url_get.html) offers punycode\nconversions, to and from IDN. Asking to convert a name that is exactly 256\nbytes, libcurl ends up reading outside of a stack based buffer when built to\nuse the *macidn* IDN backend. The conversion function then fills up the\nprovided buffer exactly - but does not null terminate the string.\n\nThis flaw can lead to stack contents accidently getting returned as part of\nthe converted string." }, { "lang": "es", "value": "La funci\u00f3n API de URL de libcurl [curl_url_get()](https://curl.se/libcurl/c/curl_url_get.html) ofrece conversiones punycode, hacia y desde IDN. Al solicitar convertir un nombre que tiene exactamente 256 bytes, libcurl termina leyendo fuera de un b\u00fafer en la regi\u00f3n stack de la memoria cuando se construye para usar el backend IDN *macidn*. Luego, la funci\u00f3n de conversi\u00f3n llena exactamente el b\u00fafer proporcionado, pero no termina en nulo la cadena. Esta falla puede provocar que el contenido de la pila se devuelva accidentalmente como parte de la cadena convertida." } ], "id": "CVE-2024-6874", "lastModified": "2024-11-21T09:50:26.493", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 1.4, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2024-07-24T08:15:03.413", "references": [ { "source": "2499f714-1537-4658-8207-48ae4bb9eae9", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2024/07/24/2" }, { "source": "2499f714-1537-4658-8207-48ae4bb9eae9", "tags": [ "Vendor Advisory" ], "url": "https://curl.se/docs/CVE-2024-6874.html" }, { "source": "2499f714-1537-4658-8207-48ae4bb9eae9", "tags": [ "Vendor Advisory" ], "url": "https://curl.se/docs/CVE-2024-6874.json" }, { "source": "2499f714-1537-4658-8207-48ae4bb9eae9", "tags": [ "Exploit", "Issue Tracking", "Technical Description" ], "url": "https://hackerone.com/reports/2604391" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2024/07/24/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://curl.se/docs/CVE-2024-6874.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://curl.se/docs/CVE-2024-6874.json" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Technical Description" ], "url": "https://hackerone.com/reports/2604391" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.netapp.com/advisory/ntap-20240822-0004/" } ], "sourceIdentifier": "2499f714-1537-4658-8207-48ae4bb9eae9", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-05-02 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Multiple stack-based buffer overflows in libcURL and cURL 7.12.1, and possibly other versions, allow remote malicious web servers to execute arbitrary code via base64 encoded replies that exceed the intended buffer lengths when decoded, which is not properly handled by (1) the Curl_input_ntlm function in http_ntlm.c during NTLM authentication or (2) the Curl_krb_kauth and krb4_auth functions in krb4.c during Kerberos authentication.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000940 | Broken Link, Patch, Vendor Advisory | |
cve@mitre.org | http://marc.info/?l=full-disclosure&m=110959085507755&w=2 | Mailing List, Patch | |
cve@mitre.org | http://www.gentoo.org/security/en/glsa/glsa-200503-20.xml | Third Party Advisory | |
cve@mitre.org | http://www.idefense.com/application/poi/display?id=202&type=vulnerabilities | Broken Link, Vendor Advisory | |
cve@mitre.org | http://www.idefense.com/application/poi/display?id=203&type=vulnerabilities | Broken Link, Vendor Advisory | |
cve@mitre.org | http://www.mandriva.com/security/advisories?name=MDKSA-2005:048 | Third Party Advisory | |
cve@mitre.org | http://www.novell.com/linux/security/advisories/2005_11_curl.html | Broken Link | |
cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2005-340.html | Broken Link | |
cve@mitre.org | http://www.securityfocus.com/bid/12615 | Broken Link, Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.securityfocus.com/bid/12616 | Broken Link, Third Party Advisory, VDB Entry | |
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/19423 | Third Party Advisory, VDB Entry | |
cve@mitre.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10273 | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000940 | Broken Link, Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=full-disclosure&m=110959085507755&w=2 | Mailing List, Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.gentoo.org/security/en/glsa/glsa-200503-20.xml | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.idefense.com/application/poi/display?id=202&type=vulnerabilities | Broken Link, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.idefense.com/application/poi/display?id=203&type=vulnerabilities | Broken Link, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDKSA-2005:048 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.novell.com/linux/security/advisories/2005_11_curl.html | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2005-340.html | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/12615 | Broken Link, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/12616 | Broken Link, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/19423 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10273 | Broken Link |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:haxx:curl:7.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "EFE80B46-33F0-4338-AF37-9E7E31FC5E83", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "06E3CB14-FB16-4F4E-9AD9-A02DC727FF6D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple stack-based buffer overflows in libcURL and cURL 7.12.1, and possibly other versions, allow remote malicious web servers to execute arbitrary code via base64 encoded replies that exceed the intended buffer lengths when decoded, which is not properly handled by (1) the Curl_input_ntlm function in http_ntlm.c during NTLM authentication or (2) the Curl_krb_kauth and krb4_auth functions in krb4.c during Kerberos authentication." } ], "id": "CVE-2005-0490", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2005-05-02T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Broken Link", "Patch", "Vendor Advisory" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000940" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Patch" ], "url": "http://marc.info/?l=full-disclosure\u0026m=110959085507755\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200503-20.xml" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://www.idefense.com/application/poi/display?id=202\u0026type=vulnerabilities" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://www.idefense.com/application/poi/display?id=203\u0026type=vulnerabilities" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:048" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.novell.com/linux/security/advisories/2005_11_curl.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-340.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/12615" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/12616" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19423" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10273" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Patch", "Vendor Advisory" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000940" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch" ], "url": "http://marc.info/?l=full-disclosure\u0026m=110959085507755\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200503-20.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://www.idefense.com/application/poi/display?id=202\u0026type=vulnerabilities" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://www.idefense.com/application/poi/display?id=203\u0026type=vulnerabilities" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:048" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.novell.com/linux/security/advisories/2005_11_curl.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-340.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/12615" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/12616" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19423" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10273" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-131" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-05-01 15:59
Modified
2025-04-12 10:46
Severity ?
Summary
The default configuration for cURL and libcurl before 7.42.1 sends custom HTTP headers to both the proxy and destination server, which might allow remote proxy servers to obtain sensitive information by reading the header contents.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://curl.haxx.se/docs/adv_20150429.html | Vendor Advisory | |
secalert@redhat.com | http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743 | ||
secalert@redhat.com | http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html | Mailing List, Third Party Advisory | |
secalert@redhat.com | http://lists.opensuse.org/opensuse-updates/2015-05/msg00017.html | ||
secalert@redhat.com | http://www.debian.org/security/2015/dsa-3240 | Third Party Advisory | |
secalert@redhat.com | http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html | ||
secalert@redhat.com | http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html | ||
secalert@redhat.com | http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html | Patch, Third Party Advisory | |
secalert@redhat.com | http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html | Patch, Third Party Advisory | |
secalert@redhat.com | http://www.securityfocus.com/bid/74408 | ||
secalert@redhat.com | http://www.securitytracker.com/id/1032233 | Third Party Advisory, VDB Entry | |
secalert@redhat.com | http://www.ubuntu.com/usn/USN-2591-1 | Third Party Advisory | |
secalert@redhat.com | https://kc.mcafee.com/corporate/index?page=content&id=SB10131 | ||
secalert@redhat.com | https://support.apple.com/kb/HT205031 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://curl.haxx.se/docs/adv_20150429.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-updates/2015-05/msg00017.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2015/dsa-3240 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/74408 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1032233 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-2591-1 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://kc.mcafee.com/corporate/index?page=content&id=SB10131 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT205031 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
oracle | enterprise_manager_ops_center | * | |
oracle | enterprise_manager_ops_center | 12.2.0 | |
oracle | enterprise_manager_ops_center | 12.2.1 | |
oracle | enterprise_manager_ops_center | 12.3.0 | |
haxx | curl | * | |
haxx | libcurl | * | |
canonical | ubuntu_linux | 12.04 | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 14.10 | |
canonical | ubuntu_linux | 15.1 | |
apple | mac_os_x | 10.10.4 | |
debian | debian_linux | 8.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:enterprise_manager_ops_center:*:*:*:*:*:*:*:*", "matchCriteriaId": "B60F073D-5C5A-4A63-9DE5-EAB6ED3A9E65", "versionEndIncluding": "12.1.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:enterprise_manager_ops_center:12.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "4725EA61-9BAB-4E72-9F92-ADE4624439CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:enterprise_manager_ops_center:12.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "D0879FB1-58E2-4EC4-8111-044642E046BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "C7CF2929-4CBC-4B56-87AE-F45F53BD8DD6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*", "matchCriteriaId": "8EC285E6-08E4-47DA-BD56-AA613015F701", "versionEndIncluding": "7.42.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*", "matchCriteriaId": "F79A4691-7C35-472A-B115-0EA3B355B021", "versionEndIncluding": "7.42.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*", "matchCriteriaId": "49A63F39-30BE-443F-AF10-6245587D3359", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "F6E0D7C3-E368-4F6C-AA67-8E066BB35654", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:10.10.4:*:*:*:*:*:*:*", "matchCriteriaId": "E8B0A12E-E122-4189-A05E-4FEA43C19876", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The default configuration for cURL and libcurl before 7.42.1 sends custom HTTP headers to both the proxy and destination server, which might allow remote proxy servers to obtain sensitive information by reading the header contents." }, { "lang": "es", "value": "La configuraci\u00f3n por defecto para cURL y libcurl anterior a 7.42.1 env\u00eda cabeceras HTTP personalizadas tanto al servidor proxy como al de destinaci\u00f3n, lo que podr\u00eda permitir a servidores proxy remotos obtener informaci\u00f3n sensible mediante la lectura de los contenidos de cabeceras." } ], "id": "CVE-2015-3153", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-05-01T15:59:05.817", "references": [ { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://curl.haxx.se/docs/adv_20150429.html" }, { "source": "secalert@redhat.com", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10743" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-updates/2015-05/msg00017.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2015/dsa-3240" }, { "source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/74408" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1032233" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2591-1" }, { "source": "secalert@redhat.com", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10131" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT205031" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://curl.haxx.se/docs/adv_20150429.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10743" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2015-05/msg00017.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2015/dsa-3240" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/74408" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1032233" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2591-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10131" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT205031" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2016-08-10 14:59
Modified
2025-04-12 10:46
Severity ?
Summary
curl and libcurl before 7.50.1 do not prevent TLS session resumption when the client certificate has changed, which allows remote attackers to bypass intended restrictions by resuming a session.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://lists.opensuse.org/opensuse-updates/2016-09/msg00011.html | ||
secalert@redhat.com | http://lists.opensuse.org/opensuse-updates/2016-09/msg00094.html | Third Party Advisory | |
secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2016-2575.html | ||
secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2016-2957.html | ||
secalert@redhat.com | http://www.debian.org/security/2016/dsa-3638 | Third Party Advisory | |
secalert@redhat.com | http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html | ||
secalert@redhat.com | http://www.securityfocus.com/bid/92292 | ||
secalert@redhat.com | http://www.securityfocus.com/bid/92319 | ||
secalert@redhat.com | http://www.securitytracker.com/id/1036538 | ||
secalert@redhat.com | http://www.securitytracker.com/id/1038341 | ||
secalert@redhat.com | http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.563059 | ||
secalert@redhat.com | http://www.ubuntu.com/usn/USN-3048-1 | ||
secalert@redhat.com | https://access.redhat.com/errata/RHSA-2018:3558 | ||
secalert@redhat.com | https://curl.haxx.se/docs/adv_20160803A.html | Mitigation, Patch, Vendor Advisory | |
secalert@redhat.com | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GLPXQQKURBQFM4XM6645VRPTOE2AWG33/ | ||
secalert@redhat.com | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K3GQH4V3XAQ5Z53AMQRDEC3C3UHTW7QR/ | ||
secalert@redhat.com | https://security.gentoo.org/glsa/201701-47 | ||
secalert@redhat.com | https://source.android.com/security/bulletin/2016-12-01.html | ||
secalert@redhat.com | https://www.tenable.com/security/tns-2016-18 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-updates/2016-09/msg00011.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-updates/2016-09/msg00094.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2016-2575.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2016-2957.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2016/dsa-3638 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/92292 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/92319 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1036538 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1038341 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.563059 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-3048-1 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:3558 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://curl.haxx.se/docs/adv_20160803A.html | Mitigation, Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GLPXQQKURBQFM4XM6645VRPTOE2AWG33/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K3GQH4V3XAQ5Z53AMQRDEC3C3UHTW7QR/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/201701-47 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://source.android.com/security/bulletin/2016-12-01.html | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.tenable.com/security/tns-2016-18 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*", "matchCriteriaId": "D7D7843C-D4F4-4C0A-A919-9000E00637B6", "versionEndIncluding": "7.50.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "matchCriteriaId": "4863BE36-D16A-4D75-90D9-FD76DB5B48B7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "curl and libcurl before 7.50.1 do not prevent TLS session resumption when the client certificate has changed, which allows remote attackers to bypass intended restrictions by resuming a session." }, { "lang": "es", "value": "curl y libcurl en versiones anteriores a 7.50.1 no previene la reanudaci\u00f3n de sesi\u00f3n TLS cuando el certificado del cliente ha cambiado, lo que permite a atacantes remotos eludir restricciones previstas reanudando sesi\u00f3n." } ], "id": "CVE-2016-5419", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-08-10T14:59:03.533", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-updates/2016-09/msg00011.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-09/msg00094.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2016-2575.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2016-2957.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2016/dsa-3638" }, { "source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/92292" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/92319" }, { "source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id/1036538" }, { "source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id/1038341" }, { "source": "secalert@redhat.com", "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.563059" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/USN-3048-1" }, { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2018:3558" }, { "source": "secalert@redhat.com", "tags": [ "Mitigation", "Patch", "Vendor Advisory" ], "url": "https://curl.haxx.se/docs/adv_20160803A.html" }, { "source": "secalert@redhat.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GLPXQQKURBQFM4XM6645VRPTOE2AWG33/" }, { "source": "secalert@redhat.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K3GQH4V3XAQ5Z53AMQRDEC3C3UHTW7QR/" }, { "source": "secalert@redhat.com", "url": "https://security.gentoo.org/glsa/201701-47" }, { "source": "secalert@redhat.com", "url": "https://source.android.com/security/bulletin/2016-12-01.html" }, { "source": "secalert@redhat.com", "url": "https://www.tenable.com/security/tns-2016-18" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2016-09/msg00011.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-09/msg00094.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2016-2575.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2016-2957.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2016/dsa-3638" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/92292" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/92319" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1036538" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1038341" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.563059" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-3048-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2018:3558" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Patch", "Vendor Advisory" ], "url": "https://curl.haxx.se/docs/adv_20160803A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GLPXQQKURBQFM4XM6645VRPTOE2AWG33/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K3GQH4V3XAQ5Z53AMQRDEC3C3UHTW7QR/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201701-47" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://source.android.com/security/bulletin/2016-12-01.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.tenable.com/security/tns-2016-18" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-310" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-10-06 13:29
Modified
2025-04-20 01:37
Severity ?
Summary
libcurl may read outside of a heap allocated buffer when doing FTP. When libcurl connects to an FTP server and successfully logs in (anonymous or not), it asks the server for the current directory with the `PWD` command. The server then responds with a 257 response containing the path, inside double quotes. The returned path name is then kept by libcurl for subsequent uses. Due to a flaw in the string parser for this directory name, a directory name passed like this but without a closing double quote would lead to libcurl not adding a trailing NUL byte to the buffer holding the name. When libcurl would then later access the string, it could read beyond the allocated heap buffer and crash or wrongly access data beyond the buffer, thinking it was part of the path. A malicious server could abuse this fact and effectively prevent libcurl-based clients to work with it - the PWD command is always issued on new FTP connections and the mistake has a high chance of causing a segfault. The simple fact that this has issue remained undiscovered for this long could suggest that malformed PWD responses are rare in benign servers. We are not aware of any exploit of this flaw. This bug was introduced in commit [415d2e7cb7](https://github.com/curl/curl/commit/415d2e7cb7), March 2005. In libcurl version 7.56.0, the parser always zero terminates the string but also rejects it if not terminated properly with a final double quote.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.debian.org/security/2017/dsa-3992 | ||
cve@mitre.org | http://www.securityfocus.com/bid/101115 | Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.securitytracker.com/id/1039509 | Third Party Advisory, VDB Entry | |
cve@mitre.org | https://access.redhat.com/errata/RHSA-2018:2486 | ||
cve@mitre.org | https://access.redhat.com/errata/RHSA-2018:3558 | ||
cve@mitre.org | https://curl.haxx.se/673d0cd8.patch | Patch, Vendor Advisory | |
cve@mitre.org | https://curl.haxx.se/docs/adv_20171004.html | Patch, Vendor Advisory | |
cve@mitre.org | https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E | ||
cve@mitre.org | https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E | ||
cve@mitre.org | https://security.gentoo.org/glsa/201712-04 | ||
cve@mitre.org | https://support.apple.com/HT208331 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2017/dsa-3992 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/101115 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1039509 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:2486 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:3558 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://curl.haxx.se/673d0cd8.patch | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://curl.haxx.se/docs/adv_20171004.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/201712-04 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/HT208331 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
haxx | libcurl | 7.7 | |
haxx | libcurl | 7.7.1 | |
haxx | libcurl | 7.7.2 | |
haxx | libcurl | 7.7.3 | |
haxx | libcurl | 7.8 | |
haxx | libcurl | 7.8.1 | |
haxx | libcurl | 7.9 | |
haxx | libcurl | 7.9.1 | |
haxx | libcurl | 7.9.2 | |
haxx | libcurl | 7.9.3 | |
haxx | libcurl | 7.9.4 | |
haxx | libcurl | 7.9.5 | |
haxx | libcurl | 7.9.6 | |
haxx | libcurl | 7.9.7 | |
haxx | libcurl | 7.9.8 | |
haxx | libcurl | 7.10 | |
haxx | libcurl | 7.10.1 | |
haxx | libcurl | 7.10.2 | |
haxx | libcurl | 7.10.3 | |
haxx | libcurl | 7.10.4 | |
haxx | libcurl | 7.10.5 | |
haxx | libcurl | 7.10.6 | |
haxx | libcurl | 7.10.7 | |
haxx | libcurl | 7.10.8 | |
haxx | libcurl | 7.11.0 | |
haxx | libcurl | 7.11.1 | |
haxx | libcurl | 7.11.2 | |
haxx | libcurl | 7.12.0 | |
haxx | libcurl | 7.12.1 | |
haxx | libcurl | 7.12.2 | |
haxx | libcurl | 7.12.3 | |
haxx | libcurl | 7.13.0 | |
haxx | libcurl | 7.13.1 | |
haxx | libcurl | 7.13.2 | |
haxx | libcurl | 7.14.0 | |
haxx | libcurl | 7.14.1 | |
haxx | libcurl | 7.15.0 | |
haxx | libcurl | 7.15.1 | |
haxx | libcurl | 7.15.2 | |
haxx | libcurl | 7.15.3 | |
haxx | libcurl | 7.15.4 | |
haxx | libcurl | 7.15.5 | |
haxx | libcurl | 7.16.0 | |
haxx | libcurl | 7.16.1 | |
haxx | libcurl | 7.16.2 | |
haxx | libcurl | 7.16.3 | |
haxx | libcurl | 7.16.4 | |
haxx | libcurl | 7.17.0 | |
haxx | libcurl | 7.17.1 | |
haxx | libcurl | 7.18.0 | |
haxx | libcurl | 7.18.1 | |
haxx | libcurl | 7.18.2 | |
haxx | libcurl | 7.19.0 | |
haxx | libcurl | 7.19.1 | |
haxx | libcurl | 7.19.2 | |
haxx | libcurl | 7.19.3 | |
haxx | libcurl | 7.19.4 | |
haxx | libcurl | 7.19.5 | |
haxx | libcurl | 7.19.6 | |
haxx | libcurl | 7.19.7 | |
haxx | libcurl | 7.20.0 | |
haxx | libcurl | 7.20.1 | |
haxx | libcurl | 7.21.0 | |
haxx | libcurl | 7.21.1 | |
haxx | libcurl | 7.21.2 | |
haxx | libcurl | 7.21.3 | |
haxx | libcurl | 7.21.4 | |
haxx | libcurl | 7.21.5 | |
haxx | libcurl | 7.21.6 | |
haxx | libcurl | 7.21.7 | |
haxx | libcurl | 7.22.0 | |
haxx | libcurl | 7.23.0 | |
haxx | libcurl | 7.23.1 | |
haxx | libcurl | 7.24.0 | |
haxx | libcurl | 7.25.0 | |
haxx | libcurl | 7.26.0 | |
haxx | libcurl | 7.27.0 | |
haxx | libcurl | 7.28.0 | |
haxx | libcurl | 7.28.1 | |
haxx | libcurl | 7.29.0 | |
haxx | libcurl | 7.30.0 | |
haxx | libcurl | 7.31.0 | |
haxx | libcurl | 7.32.0 | |
haxx | libcurl | 7.33.0 | |
haxx | libcurl | 7.34.0 | |
haxx | libcurl | 7.35.0 | |
haxx | libcurl | 7.36.0 | |
haxx | libcurl | 7.37.0 | |
haxx | libcurl | 7.37.1 | |
haxx | libcurl | 7.38.0 | |
haxx | libcurl | 7.39 | |
haxx | libcurl | 7.40.0 | |
haxx | libcurl | 7.41.0 | |
haxx | libcurl | 7.42.0 | |
haxx | libcurl | 7.42.1 | |
haxx | libcurl | 7.43.0 | |
haxx | libcurl | 7.44.0 | |
haxx | libcurl | 7.45.0 | |
haxx | libcurl | 7.46.0 | |
haxx | libcurl | 7.47.0 | |
haxx | libcurl | 7.47.1 | |
haxx | libcurl | 7.48.0 | |
haxx | libcurl | 7.49.0 | |
haxx | libcurl | 7.49.1 | |
haxx | libcurl | 7.50.0 | |
haxx | libcurl | 7.50.1 | |
haxx | libcurl | 7.50.2 | |
haxx | libcurl | 7.50.3 | |
haxx | libcurl | 7.51.0 | |
haxx | libcurl | 7.52.0 | |
haxx | libcurl | 7.52.1 | |
haxx | libcurl | 7.53.0 | |
haxx | libcurl | 7.53.1 | |
haxx | libcurl | 7.54.0 | |
haxx | libcurl | 7.54.1 | |
haxx | libcurl | 7.55.0 | |
haxx | libcurl | 7.55.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:haxx:libcurl:7.7:*:*:*:*:*:*:*", "matchCriteriaId": "FB30E8CE-57AD-4225-8BC1-0C496A8A3D8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "F884BEE7-8AD7-4C39-B955-85578ADA7E5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "9C70D1DF-E117-409F-A4DE-8602AFCF9F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "E546224C-AA58-4025-B921-8D5ED1365FD2", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.8:*:*:*:*:*:*:*", "matchCriteriaId": "8360A6AE-9735-4019-9A24-A5045D528455", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "21EDD6A3-9D85-4E54-96BB-3A8055EB286C", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.9:*:*:*:*:*:*:*", "matchCriteriaId": "BE48C5C5-DF42-495D-A5A7-D189AE873CF6", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "CF611F14-AC9A-4D7E-BF95-2D00D880C40B", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "C378EDAB-0D0C-4A63-B230-0DC8EB74C5A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "A6D6717E-CB09-493D-AD86-7D5C7782CE12", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "6AF87C3C-1AF9-4015-A794-C160AD3128D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "4CDAFF2D-1F8C-45CD-BADC-8CBCEC27A8CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "F7EDAFA2-030E-438B-B83A-CF78A409D382", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "6CE2A761-2015-4E52-B284-02DC7ED03636", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "83BF3E1B-2F71-4142-A2A5-EA859D806094", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.10:*:*:*:*:*:*:*", "matchCriteriaId": "72EBCE6C-E0B9-4119-AD71-BF5CD3730D4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "5DBB2456-4B56-48CC-8A5C-55D5F9CC770B", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.10.2:*:*:*:*:*:*:*", "matchCriteriaId": "EE20AFEE-7287-4BCE-AE29-32E967FF8F9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.10.3:*:*:*:*:*:*:*", "matchCriteriaId": "1060ADF7-99EF-46B1-A999-106E86DC0562", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.10.4:*:*:*:*:*:*:*", "matchCriteriaId": "D66CFF54-F18B-4B82-A39D-99F1D53B6357", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.10.5:*:*:*:*:*:*:*", "matchCriteriaId": "9D7E1B7D-45B3-4803-B490-FDE40F018738", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.10.6:*:*:*:*:*:*:*", "matchCriteriaId": "2E1F9453-1FB6-4CA7-9285-A243E56667B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.10.7:*:*:*:*:*:*:*", "matchCriteriaId": "F79828BB-2412-46AD-BE3C-A51B48E191AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.10.8:*:*:*:*:*:*:*", "matchCriteriaId": "72D0F13F-D56F-4C1C-A3CF-2E4E704817CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "90A4F2E2-1B43-470E-8935-CB32F12A0124", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "797DF5C7-509E-48FD-BD04-C66E01748728", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.11.2:*:*:*:*:*:*:*", "matchCriteriaId": "47BD868A-CE3B-4E39-A588-C4EDA3265A71", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "4A2EE400-1C36-40F4-A9D1-9AB432F168BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "06E3CB14-FB16-4F4E-9AD9-A02DC727FF6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.12.2:*:*:*:*:*:*:*", "matchCriteriaId": "08DCC42C-C881-4AEA-9348-E8317C54D62B", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.12.3:*:*:*:*:*:*:*", "matchCriteriaId": "2BC4EF5A-C8CB-4F33-B4D1-E4192B179D26", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.13.0:*:*:*:*:*:*:*", "matchCriteriaId": "81CEF54A-9668-4031-926F-9B978DD5CDF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.13.1:*:*:*:*:*:*:*", "matchCriteriaId": "45068C90-8915-4D19-B36B-993980E28D08", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.13.2:*:*:*:*:*:*:*", "matchCriteriaId": "24543011-2458-47B5-984A-901E70084902", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.14.0:*:*:*:*:*:*:*", "matchCriteriaId": "FB482A9C-D577-4AEE-A08F-CAFA6586B51E", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.14.1:*:*:*:*:*:*:*", "matchCriteriaId": "65AF9B86-A555-4D5E-B24E-9EBF78BCD8CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.15.0:*:*:*:*:*:*:*", "matchCriteriaId": "60BBDF07-DB97-433E-B542-EFEBE45550DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.15.1:*:*:*:*:*:*:*", "matchCriteriaId": "CA8BE3F8-82ED-4DD7-991E-979E950C98B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.15.2:*:*:*:*:*:*:*", "matchCriteriaId": "738AA231-4694-46E8-B559-1594263A9987", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.15.3:*:*:*:*:*:*:*", "matchCriteriaId": "E9E1F171-B887-499A-BF4F-538EBF347811", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.15.4:*:*:*:*:*:*:*", "matchCriteriaId": "07AA276A-0EBA-4DC9-951C-8F8159FAC7A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.15.5:*:*:*:*:*:*:*", "matchCriteriaId": "8DEEF534-9AD2-4439-9D69-E91D062C4647", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.16.0:*:*:*:*:*:*:*", "matchCriteriaId": "63643BE1-C978-4CD2-8ED1-2B979DB0676E", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.16.1:*:*:*:*:*:*:*", "matchCriteriaId": "F6FA04A0-9258-4654-ABCF-F41340B1FA35", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.16.2:*:*:*:*:*:*:*", "matchCriteriaId": "DE829230-AFDB-4131-9C6A-D9D7A66C5B57", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.16.3:*:*:*:*:*:*:*", "matchCriteriaId": "B7E8BA30-8087-48D4-AE1B-48326FF826B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.16.4:*:*:*:*:*:*:*", "matchCriteriaId": "47970EFF-2F51-4875-A6BD-E30614E13278", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.17.0:*:*:*:*:*:*:*", "matchCriteriaId": "52C9B668-3204-41C5-A82E-262BDFA541DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*", "matchCriteriaId": "08C8EE1E-E186-42D6-8B12-05865C73F261", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*", "matchCriteriaId": "EEA3D88B-41B9-4D79-B47D-B3D6058C0C27", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.18.1:*:*:*:*:*:*:*", "matchCriteriaId": "C2C80901-D48E-4C2A-9BED-A40007A11C97", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*", "matchCriteriaId": "331A51E4-AA73-486F-9618-5A83965F2436", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.0:*:*:*:*:*:*:*", "matchCriteriaId": "EB32DF2C-9208-4853-ADEB-B00D764D7467", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.1:*:*:*:*:*:*:*", "matchCriteriaId": "E05636DC-7E38-4605-AAB8-81C0AE37520A", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.2:*:*:*:*:*:*:*", "matchCriteriaId": "624DF2F1-53FD-48D3-B93D-44E99C9C0C5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*", "matchCriteriaId": "F2171C7C-311A-4405-B95F-3A54966FA844", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.4:*:*:*:*:*:*:*", "matchCriteriaId": "5DE20A41-8B53-46FC-9002-69CC7495171F", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.5:*:*:*:*:*:*:*", "matchCriteriaId": "87ED9DA0-E880-4CBB-B1AC-5AEE8A004718", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.6:*:*:*:*:*:*:*", "matchCriteriaId": "5293C7F0-BF9F-4768-889A-876CE78903CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.7:*:*:*:*:*:*:*", "matchCriteriaId": "F3EB41B3-65F3-4B0E-8CCC-325B14AF605B", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "857B244C-2AFB-40C7-A893-7C6DE9871BCE", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.20.1:*:*:*:*:*:*:*", "matchCriteriaId": "B732CE55-820A-40E0-A885-71BBB6CF8C15", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.0:*:*:*:*:*:*:*", "matchCriteriaId": "0455A5F2-1515-4CD8-BA2F-74D28E91A661", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.1:*:*:*:*:*:*:*", "matchCriteriaId": "29034B3A-BE9D-4D68-8C56-4465C03C3693", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*", "matchCriteriaId": "6249538E-FBCB-4130-91FB-DA78D7BA45DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.3:*:*:*:*:*:*:*", "matchCriteriaId": "5E11B8A5-50A2-468F-BFB3-86DD9D28AC73", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.4:*:*:*:*:*:*:*", "matchCriteriaId": "9EAE25A0-3828-46F1-AB30-88732CBC9F38", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.5:*:*:*:*:*:*:*", "matchCriteriaId": "1533A85C-2160-445D-8787-E624AEDC5A0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.6:*:*:*:*:*:*:*", "matchCriteriaId": "D87B9393-7EA4-43DA-900C-7E840AE2D4C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.7:*:*:*:*:*:*:*", "matchCriteriaId": "7D1249E9-304F-4952-8DAB-8B79CE5E7D54", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*", "matchCriteriaId": "83FAF953-6A65-4FAB-BDB5-03B468CD1C9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*", "matchCriteriaId": "29F8FF1F-A639-4161-9366-62528AAF4C07", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.23.1:*:*:*:*:*:*:*", "matchCriteriaId": "812AB429-379A-4EDE-9664-5BC2989053F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.24.0:*:*:*:*:*:*:*", "matchCriteriaId": "13DD791F-C4BD-4456-955A-92E84082AA09", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.25.0:*:*:*:*:*:*:*", "matchCriteriaId": "4A17E442-45AA-4780-98B4-9BF764DCC1C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*", "matchCriteriaId": "F6AF544C-5F16-4434-B9FB-93B1B7318950", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*", "matchCriteriaId": "CBFD9ED9-2412-44AE-9C55-0ED03A121B23", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*", "matchCriteriaId": "67CCE31B-ABDA-4F32-BAF1-B1AD0664B3E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*", "matchCriteriaId": "9E66A332-ECD1-4452-B444-FB629022FDF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.29.0:*:*:*:*:*:*:*", "matchCriteriaId": "CDD3D599-35E9-4590-B5E0-3AF04D344695", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.30.0:*:*:*:*:*:*:*", "matchCriteriaId": "A3B6BFFB-7967-482C-9B49-4BD25C815299", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*", "matchCriteriaId": "1791BF6D-2C96-4A6E-90D4-2906A73601F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*", "matchCriteriaId": "260DD751-4145-4B75-B892-5FC932C6A305", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*", "matchCriteriaId": "EFF4AD0D-2EC5-4CE8-B6B3-2EC8ED2FF118", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*", "matchCriteriaId": "3EB1CB85-0A9B-4816-B471-278774EE6D4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*", "matchCriteriaId": "3831AB03-4E7E-476D-9623-58AADC188DFE", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*", "matchCriteriaId": "ABACE305-2F0C-4B59-BC5C-6DF162B450E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*", "matchCriteriaId": "6FAC1B55-F492-484E-B837-E7745682DE0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.37.1:*:*:*:*:*:*:*", "matchCriteriaId": "E0D57914-B40A-462B-9C78-6433BE2B2DB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.38.0:*:*:*:*:*:*:*", "matchCriteriaId": "A9A12DF7-62C5-46AD-9236-E2821C64156E", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.39:*:*:*:*:*:*:*", "matchCriteriaId": "4C43697D-390A-4AC0-A5D8-62B6D22245BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.40.0:*:*:*:*:*:*:*", "matchCriteriaId": "D52E9E9F-7A35-4CB9-813E-5A1D4A36415C", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.41.0:*:*:*:*:*:*:*", "matchCriteriaId": "257291FB-969C-4413-BA81-806B5E1B40A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.42.0:*:*:*:*:*:*:*", "matchCriteriaId": "88DC6ED5-4C1A-4ED0-97BA-B245C4A236C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.42.1:*:*:*:*:*:*:*", "matchCriteriaId": "51AA7383-3AA1-4A3B-BA46-BBA8FBDC10DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.43.0:*:*:*:*:*:*:*", "matchCriteriaId": "003D8430-AA07-41B5-9F22-696C554CB277", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.44.0:*:*:*:*:*:*:*", "matchCriteriaId": "6C3ED21E-7907-4248-A32F-BB3102A80DC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.45.0:*:*:*:*:*:*:*", "matchCriteriaId": "B2E41520-CA31-4BA0-B247-F1DCAAE98DD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.46.0:*:*:*:*:*:*:*", "matchCriteriaId": "57F2C633-D720-4FD9-9C75-2D4C57120357", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.47.0:*:*:*:*:*:*:*", "matchCriteriaId": "A8F2FBC9-059A-4299-B59F-8EFD797E3704", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.47.1:*:*:*:*:*:*:*", "matchCriteriaId": "920FCC26-B458-46D8-B023-DB4C19A51718", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.48.0:*:*:*:*:*:*:*", "matchCriteriaId": "B21C08D5-7454-4292-A87C-900C9494E38B", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.49.0:*:*:*:*:*:*:*", "matchCriteriaId": "3B727926-90A2-4A7E-9905-70160C1E0D8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.49.1:*:*:*:*:*:*:*", "matchCriteriaId": "C1A247AE-B209-42BE-8BE7-865AE279D23E", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.50.0:*:*:*:*:*:*:*", "matchCriteriaId": "8429FF9B-D7EA-40E6-A6E8-961EA71F20C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.50.1:*:*:*:*:*:*:*", "matchCriteriaId": "9D387194-720A-4D9C-928E-6FAF2EC6C33C", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.50.2:*:*:*:*:*:*:*", "matchCriteriaId": "F2782D32-B023-47B1-A513-251D5093CE5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.50.3:*:*:*:*:*:*:*", "matchCriteriaId": "8373A4E6-BA92-4B5B-9E97-E8C1E8C22C13", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.51.0:*:*:*:*:*:*:*", "matchCriteriaId": "084F63A4-64E4-48FC-8B8C-A4F3E7D39D08", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.52.0:*:*:*:*:*:*:*", "matchCriteriaId": "F0D4DFF0-9953-4AB8-8C24-3977448BFE64", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.52.1:*:*:*:*:*:*:*", "matchCriteriaId": "1B5B274B-F232-47E8-9E8A-0EB08F97DE40", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.53.0:*:*:*:*:*:*:*", "matchCriteriaId": "73E42C72-868A-4AE4-A33E-79F8190C94C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.53.1:*:*:*:*:*:*:*", "matchCriteriaId": "24E2F3C4-5D88-4C16-BAA7-A34CF7687415", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.54.0:*:*:*:*:*:*:*", "matchCriteriaId": "067EB50A-E70F-4C04-ACE7-67BD7E5A4344", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.54.1:*:*:*:*:*:*:*", "matchCriteriaId": "7C1D4922-F424-45B1-AF98-B1DD33981110", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.55.0:*:*:*:*:*:*:*", "matchCriteriaId": "43503F62-A348-4098-9121-214468EADF5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.55.1:*:*:*:*:*:*:*", "matchCriteriaId": "B474D572-D1BE-45E1-A22E-309CB358A365", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "libcurl may read outside of a heap allocated buffer when doing FTP. When libcurl connects to an FTP server and successfully logs in (anonymous or not), it asks the server for the current directory with the `PWD` command. The server then responds with a 257 response containing the path, inside double quotes. The returned path name is then kept by libcurl for subsequent uses. Due to a flaw in the string parser for this directory name, a directory name passed like this but without a closing double quote would lead to libcurl not adding a trailing NUL byte to the buffer holding the name. When libcurl would then later access the string, it could read beyond the allocated heap buffer and crash or wrongly access data beyond the buffer, thinking it was part of the path. A malicious server could abuse this fact and effectively prevent libcurl-based clients to work with it - the PWD command is always issued on new FTP connections and the mistake has a high chance of causing a segfault. The simple fact that this has issue remained undiscovered for this long could suggest that malformed PWD responses are rare in benign servers. We are not aware of any exploit of this flaw. This bug was introduced in commit [415d2e7cb7](https://github.com/curl/curl/commit/415d2e7cb7), March 2005. In libcurl version 7.56.0, the parser always zero terminates the string but also rejects it if not terminated properly with a final double quote." }, { "lang": "es", "value": "libcurl podr\u00eda leer fuera de un b\u00fafer asignado en la memoria din\u00e1mica (heap) cuando realiza FTP. Cuando libcurl se conecta a un servidor FTP y logra iniciar sesi\u00f3n correctamente (de forma an\u00f3nima o no), pregunta al servidor por el directorio actual con el comando \"PWD\". El servidor contesta con una respuesta 257 que contiene la ruta (dentro de comillas dobles). El nombre de ruta devuelto lo almacena libcurl para usos posteriores. Debido a un error en el analizador sint\u00e1ctico de cadenas para este nombre de directorio, un nombre de directorio pasado de esta forma pero sin una comilla doble de cierre desembocar\u00eda en que libcurl no a\u00f1ade un byte NUL final al b\u00fafer que sostiene el nombre. Cuando libcurl accede a la cadena, podr\u00eda leer m\u00e1s all\u00e1 del b\u00fafer de memoria din\u00e1mica (heap) asignado y cerrarse inesperadamente o acceder err\u00f3neamente a datos m\u00e1s all\u00e1 del b\u00fafer, creyendo que forma parte de la ruta. Un servidor malicioso podr\u00eda aprovechar este hecho y evitar que clientes de libcurl lo empleen - el comando PWD siempre se emite en nuevas conexiones FTP y el error tiene una gran posibilidad de provocar una violaci\u00f3n de acceso. El hecho de que este problema se ha mantenido sin conocer durante tanto tiempo podr\u00eda indicar que las respuestas PWD mal formadas son raras en nuevos servidores. No se tiene constancia de exploits de este fallo. Este bug fue introducido en el commit [415d2e7cb7](https://github.com/curl/curl/commit/415d2e7cb7) en marzo de 2005. En la versi\u00f3n 7.46.0 de libcurl, el analizador sint\u00e1ctico siempre finaliza la cadena en cero, pero tambi\u00e9n la rechaza si no se finaliza correctamente con una comilla doble final." } ], "id": "CVE-2017-1000254", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-10-06T13:29:00.207", "references": [ { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2017/dsa-3992" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/101115" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039509" }, { "source": "cve@mitre.org", "url": "https://access.redhat.com/errata/RHSA-2018:2486" }, { "source": "cve@mitre.org", "url": "https://access.redhat.com/errata/RHSA-2018:3558" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://curl.haxx.se/673d0cd8.patch" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://curl.haxx.se/docs/adv_20171004.html" }, { "source": "cve@mitre.org", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "cve@mitre.org", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "cve@mitre.org", "url": "https://security.gentoo.org/glsa/201712-04" }, { "source": "cve@mitre.org", "url": "https://support.apple.com/HT208331" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2017/dsa-3992" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/101115" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039509" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2018:2486" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2018:3558" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://curl.haxx.se/673d0cd8.patch" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://curl.haxx.se/docs/adv_20171004.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201712-04" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.apple.com/HT208331" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-02-06 20:29
Modified
2024-11-21 04:42
Severity ?
Summary
libcurl versions from 7.36.0 to before 7.64.0 are vulnerable to a stack-based buffer overflow. The function creating an outgoing NTLM type-3 header (`lib/vauth/ntlm.c:Curl_auth_create_ntlm_type3_message()`), generates the request HTTP header contents based on previously received data. The check that exists to prevent the local buffer from getting overflowed is implemented wrongly (using unsigned math) and as such it does not prevent the overflow from happening. This output data can grow larger than the local buffer if very large 'nt response' data is extracted from a previous NTLMv2 header provided by the malicious or broken HTTP server. Such a 'large value' needs to be around 1000 bytes or more. The actual payload data copied to the target buffer comes from the NTLMv2 type-2 response header.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://www.securityfocus.com/bid/106950 | Third Party Advisory, VDB Entry | |
secalert@redhat.com | https://access.redhat.com/errata/RHSA-2019:3701 | Third Party Advisory | |
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3822 | Exploit, Issue Tracking, Patch, Third Party Advisory | |
secalert@redhat.com | https://cert-portal.siemens.com/productcert/pdf/ssa-436177.pdf | Third Party Advisory | |
secalert@redhat.com | https://curl.haxx.se/docs/CVE-2019-3822.html | Patch, Vendor Advisory | |
secalert@redhat.com | https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f%40%3Cdevnull.infra.apache.org%3E | ||
secalert@redhat.com | https://security.gentoo.org/glsa/201903-03 | Third Party Advisory | |
secalert@redhat.com | https://security.netapp.com/advisory/ntap-20190315-0001/ | Patch, Third Party Advisory | |
secalert@redhat.com | https://security.netapp.com/advisory/ntap-20190719-0004/ | Third Party Advisory | |
secalert@redhat.com | https://support.f5.com/csp/article/K84141449 | Third Party Advisory | |
secalert@redhat.com | https://support.f5.com/csp/article/K84141449?utm_source=f5support&%3Butm_medium=RSS | ||
secalert@redhat.com | https://usn.ubuntu.com/3882-1/ | Third Party Advisory | |
secalert@redhat.com | https://www.debian.org/security/2019/dsa-4386 | Third Party Advisory | |
secalert@redhat.com | https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html | Patch, Third Party Advisory | |
secalert@redhat.com | https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/106950 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2019:3701 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3822 | Exploit, Issue Tracking, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-436177.pdf | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://curl.haxx.se/docs/CVE-2019-3822.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f%40%3Cdevnull.infra.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/201903-03 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20190315-0001/ | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20190719-0004/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.f5.com/csp/article/K84141449 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.f5.com/csp/article/K84141449?utm_source=f5support&%3Butm_medium=RSS | ||
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3882-1/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2019/dsa-4386 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html | Patch, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
haxx | libcurl | * | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 16.04 | |
canonical | ubuntu_linux | 18.04 | |
canonical | ubuntu_linux | 18.10 | |
debian | debian_linux | 9.0 | |
netapp | active_iq_unified_manager | * | |
netapp | active_iq_unified_manager | * | |
netapp | clustered_data_ontap | * | |
netapp | oncommand_insight | - | |
netapp | oncommand_workflow_automation | - | |
netapp | snapcenter | - | |
siemens | sinema_remote_connect_client | * | |
oracle | communications_operations_monitor | 3.4 | |
oracle | communications_operations_monitor | 4.0 | |
oracle | enterprise_manager_ops_center | 12.3.3 | |
oracle | enterprise_manager_ops_center | 12.4.0 | |
oracle | http_server | 12.2.1.3.0 | |
oracle | mysql_server | * | |
oracle | mysql_server | * | |
oracle | secure_global_desktop | 5.4 | |
oracle | services_tools_bundle | 19.2 | |
redhat | enterprise_linux | 8.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*", "matchCriteriaId": "0572AA2C-5E33-4612-8BDE-0859690EA089", "versionEndExcluding": "7.64.0", "versionStartIncluding": "7.36.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*", "matchCriteriaId": "07C312A0-CD2C-4B9C-B064-6409B25C278F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*", "matchCriteriaId": "BD075607-09B7-493E-8611-66D041FFDA62", "versionStartIncluding": "7.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*", "matchCriteriaId": "B64FC591-5854-4480-A6E2-5E953C2415B3", "versionStartIncluding": "9.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:clustered_data_ontap:*:*:*:*:*:*:*:*", "matchCriteriaId": "406B640C-BA48-4C1A-B5B5-6006CB7027B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1BE6C1F-2565-4E97-92AA-16563E5660A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*", "matchCriteriaId": "5735E553-9731-4AAC-BCFF-989377F817B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*", "matchCriteriaId": "BDFB1169-41A0-4A86-8E4F-FDA9730B1E94", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:sinema_remote_connect_client:*:*:*:*:*:*:*:*", "matchCriteriaId": "626EEBF4-73B9-44B3-BF55-50EC9139EF66", "versionEndIncluding": "2.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:communications_operations_monitor:3.4:*:*:*:*:*:*:*", "matchCriteriaId": "D52F557F-D0A0-43D3-85F1-F10B6EBFAEDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_operations_monitor:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "E3517A27-E6EE-497C-9996-F78171BBE90F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "AB654DFA-FEF9-4D00-ADB0-F3F2B6ACF13E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "37209C6F-EF99-4D21-9608-B3A06D283D24", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "DFC79B17-E9D2-44D5-93ED-2F959E7A3D43", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B4E0C85-8423-4C50-8778-405919C2981C", "versionEndIncluding": "5.7.26", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E290736-CCF9-4F18-B0B0-BAF0084FE9C4", "versionEndIncluding": "8.0.15", "versionStartIncluding": "5.7.27", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:secure_global_desktop:5.4:*:*:*:*:*:*:*", "matchCriteriaId": "B5265C91-FF5C-4451-A7C2-D388A65ACFA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:services_tools_bundle:19.2:*:*:*:*:*:*:*", "matchCriteriaId": "62DAD71E-A6D5-4CA9-A016-100F2D5114A6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "libcurl versions from 7.36.0 to before 7.64.0 are vulnerable to a stack-based buffer overflow. The function creating an outgoing NTLM type-3 header (`lib/vauth/ntlm.c:Curl_auth_create_ntlm_type3_message()`), generates the request HTTP header contents based on previously received data. The check that exists to prevent the local buffer from getting overflowed is implemented wrongly (using unsigned math) and as such it does not prevent the overflow from happening. This output data can grow larger than the local buffer if very large \u0027nt response\u0027 data is extracted from a previous NTLMv2 header provided by the malicious or broken HTTP server. Such a \u0027large value\u0027 needs to be around 1000 bytes or more. The actual payload data copied to the target buffer comes from the NTLMv2 type-2 response header." }, { "lang": "es", "value": "Libcurl, desde la versi\u00f3n 7.36.0 hasta antes de la 7.64.0, es vulnerable a un desbordamiento de b\u00fafer basado en pila. La funci\u00f3n que crea una cabecera saliente NTLM de tipo 3 (\"lib/vauth/ntlm.c:Curl_auth_create_ntlm_type3_message()\") genera el contenido de la cabecera de petici\u00f3n HTTP bas\u00e1ndose en datos recibidos anteriormente. La comprobaci\u00f3n para evitar que el b\u00fafer local se desborde est\u00e1 mal implementada (utilizando matem\u00e1tica no firmada) y, as\u00ed, no evita que el desbordamiento ocurra. Estos datos de salida pueden aumentar m\u00e1s que el b\u00fafer local si se extraen datos \"nt response\" muy grandes de una cabecera NTLMv2 previa, proporcionada por el servidor HTTP malicioso o roto. Este \"valor grande\" necesita ser de, aproximadamente, 1000 bytes o m\u00e1s. Los datos reales de la carga \u00fatil que se copian al b\u00fafer objetivo provienen de la cabecera de respuesta NTLMv2 de tipo 2." } ], "id": "CVE-2019-3822", "lastModified": "2024-11-21T04:42:36.923", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 4.2, "source": "secalert@redhat.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-02-06T20:29:00.353", "references": [ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106950" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3701" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3822" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-436177.pdf" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://curl.haxx.se/docs/CVE-2019-3822.html" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f%40%3Cdevnull.infra.apache.org%3E" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201903-03" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20190315-0001/" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20190719-0004/" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://support.f5.com/csp/article/K84141449" }, { "source": "secalert@redhat.com", "url": "https://support.f5.com/csp/article/K84141449?utm_source=f5support\u0026amp%3Butm_medium=RSS" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3882-1/" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2019/dsa-4386" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106950" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3701" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3822" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-436177.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://curl.haxx.se/docs/CVE-2019-3822.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f%40%3Cdevnull.infra.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201903-03" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20190315-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20190719-0004/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.f5.com/csp/article/K84141449" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.f5.com/csp/article/K84141449?utm_source=f5support\u0026amp%3Butm_medium=RSS" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3882-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2019/dsa-4386" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-121" } ], "source": "secalert@redhat.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-03-08 22:55
Modified
2025-04-11 00:51
Severity ?
Summary
Stack-based buffer overflow in the Curl_sasl_create_digest_md5_message function in lib/curl_sasl.c in curl and libcurl 7.26.0 through 7.28.1, when negotiating SASL DIGEST-MD5 authentication, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long string in the realm parameter in a (1) POP3, (2) SMTP or (3) IMAP message.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://blog.volema.com/curl-rce.html | ||
secalert@redhat.com | http://curl.haxx.se/docs/adv_20130206.html | Vendor Advisory | |
secalert@redhat.com | http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html | ||
secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2013-February/099140.html | ||
secalert@redhat.com | http://nakedsecurity.sophos.com/2013/02/10/anatomy-of-a-vulnerability-curl-web-download-toolkit-holed-by-authentication-bug/ | ||
secalert@redhat.com | http://packetstormsecurity.com/files/120147/cURL-Buffer-Overflow.html | ||
secalert@redhat.com | http://packetstormsecurity.com/files/120170/Slackware-Security-Advisory-curl-Updates.html | ||
secalert@redhat.com | http://www.exploit-db.com/exploits/24487 | Exploit | |
secalert@redhat.com | http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html | ||
secalert@redhat.com | http://www.osvdb.org/89988 | ||
secalert@redhat.com | http://www.securityfocus.com/bid/57842 | ||
secalert@redhat.com | http://www.securitytracker.com/id/1028093 | ||
secalert@redhat.com | http://www.ubuntu.com/usn/USN-1721-1 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://blog.volema.com/curl-rce.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://curl.haxx.se/docs/adv_20130206.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2013-February/099140.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://nakedsecurity.sophos.com/2013/02/10/anatomy-of-a-vulnerability-curl-web-download-toolkit-holed-by-authentication-bug/ | ||
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/120147/cURL-Buffer-Overflow.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/120170/Slackware-Security-Advisory-curl-Updates.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.exploit-db.com/exploits/24487 | Exploit | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.osvdb.org/89988 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/57842 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1028093 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-1721-1 | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:haxx:curl:7.26.0:*:*:*:*:*:*:*", "matchCriteriaId": "D204E994-4591-403C-8EF3-D3B7BF4AA1A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.27.0:*:*:*:*:*:*:*", "matchCriteriaId": "EBF5418D-1162-4B1E-BC3D-06A3E084BEFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.28.0:*:*:*:*:*:*:*", "matchCriteriaId": "1CA65F31-3D54-4F66-A0A3-2BD993FF38F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.28.1:*:*:*:*:*:*:*", "matchCriteriaId": "41ACC9FE-62FF-424B-B4B8-B033FEAF7686", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*", "matchCriteriaId": "F6AF544C-5F16-4434-B9FB-93B1B7318950", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*", "matchCriteriaId": "CBFD9ED9-2412-44AE-9C55-0ED03A121B23", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*", "matchCriteriaId": "67CCE31B-ABDA-4F32-BAF1-B1AD0664B3E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*", "matchCriteriaId": "9E66A332-ECD1-4452-B444-FB629022FDF0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "matchCriteriaId": "E2076871-2E80-4605-A470-A41C1A8EC7EE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the Curl_sasl_create_digest_md5_message function in lib/curl_sasl.c in curl and libcurl 7.26.0 through 7.28.1, when negotiating SASL DIGEST-MD5 authentication, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long string in the realm parameter in a (1) POP3, (2) SMTP or (3) IMAP message." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en pila en la funci\u00f3n de curl_sasl_create_digest_md5_message de libcurl en lib/curl_sasl.c v7.26.0 hasta v7.28.1 a durante la negociaci\u00f3n de la autenticaci\u00f3n SASL DIGEST-MD5, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda de la aplicaci\u00f3n) y posiblemente ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de una cadena demasiado larga en el par\u00e1metro \u0027realm\u0027 en un mensaje (1) POP3, (2) SMTP o (3) IMAP." } ], "id": "CVE-2013-0249", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-03-08T22:55:01.123", "references": [ { "source": "secalert@redhat.com", "url": "http://blog.volema.com/curl-rce.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://curl.haxx.se/docs/adv_20130206.html" }, { "source": "secalert@redhat.com", "url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-February/099140.html" }, { "source": "secalert@redhat.com", "url": "http://nakedsecurity.sophos.com/2013/02/10/anatomy-of-a-vulnerability-curl-web-download-toolkit-holed-by-authentication-bug/" }, { "source": "secalert@redhat.com", "url": "http://packetstormsecurity.com/files/120147/cURL-Buffer-Overflow.html" }, { "source": "secalert@redhat.com", "url": "http://packetstormsecurity.com/files/120170/Slackware-Security-Advisory-curl-Updates.html" }, { "source": "secalert@redhat.com", "tags": [ "Exploit" ], "url": "http://www.exploit-db.com/exploits/24487" }, { "source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "source": "secalert@redhat.com", "url": "http://www.osvdb.org/89988" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/57842" }, { "source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id/1028093" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://www.ubuntu.com/usn/USN-1721-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://blog.volema.com/curl-rce.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://curl.haxx.se/docs/adv_20130206.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-February/099140.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://nakedsecurity.sophos.com/2013/02/10/anatomy-of-a-vulnerability-curl-web-download-toolkit-holed-by-authentication-bug/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://packetstormsecurity.com/files/120147/cURL-Buffer-Overflow.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://packetstormsecurity.com/files/120170/Slackware-Security-Advisory-curl-Updates.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.exploit-db.com/exploits/24487" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/89988" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/57842" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1028093" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.ubuntu.com/usn/USN-1721-1" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-06-22 19:59
Modified
2025-04-12 10:46
Severity ?
Summary
The smb_request_state function in cURL and libcurl 7.40.0 through 7.42.1 allows remote SMB servers to obtain sensitive information from memory or cause a denial of service (out-of-bounds read and crash) via crafted length and offset values.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://curl.haxx.se/docs/adv_20150617B.html | Vendor Advisory | |
secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160660.html | ||
secalert@redhat.com | http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html | Patch, Third Party Advisory | |
secalert@redhat.com | http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html | ||
secalert@redhat.com | http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html | ||
secalert@redhat.com | http://www.securityfocus.com/bid/75387 | ||
secalert@redhat.com | http://www.securityfocus.com/bid/91787 | Third Party Advisory, VDB Entry | |
secalert@redhat.com | http://www.securitytracker.com/id/1036371 | ||
secalert@redhat.com | https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05111017 | Third Party Advisory | |
secalert@redhat.com | https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380 | ||
secalert@redhat.com | https://security.gentoo.org/glsa/201509-02 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://curl.haxx.se/docs/adv_20150617B.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160660.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/75387 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/91787 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1036371 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05111017 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/201509-02 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
haxx | curl | 7.40.0 | |
haxx | curl | 7.41.0 | |
haxx | curl | 7.42.0 | |
haxx | curl | 7.42.1 | |
haxx | libcurl | 7.40.0 | |
haxx | libcurl | 7.41.0 | |
haxx | libcurl | 7.42.0 | |
haxx | libcurl | 7.42.1 | |
hp | system_management_homepage | * | |
oracle | enterprise_manager_ops_center | 12.1.4 | |
oracle | enterprise_manager_ops_center | 12.2.2 | |
oracle | enterprise_manager_ops_center | 12.3.2 | |
oracle | glassfish_server | 3.0.1 | |
oracle | glassfish_server | 3.1.2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:haxx:curl:7.40.0:*:*:*:*:*:*:*", "matchCriteriaId": "5DEBBFCA-6A18-4F8F-B841-50255C952FA0", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.41.0:*:*:*:*:*:*:*", "matchCriteriaId": "FEEAE437-A645-468B-B283-44799658F534", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.42.0:*:*:*:*:*:*:*", "matchCriteriaId": "03F7EE95-4EBE-4306-ADFE-A1A92CAD5F24", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.42.1:*:*:*:*:*:*:*", "matchCriteriaId": "79F7AE71-7A18-4737-9C02-0A3343B3AD4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.40.0:*:*:*:*:*:*:*", "matchCriteriaId": "D52E9E9F-7A35-4CB9-813E-5A1D4A36415C", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.41.0:*:*:*:*:*:*:*", "matchCriteriaId": "257291FB-969C-4413-BA81-806B5E1B40A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.42.0:*:*:*:*:*:*:*", "matchCriteriaId": "88DC6ED5-4C1A-4ED0-97BA-B245C4A236C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.42.1:*:*:*:*:*:*:*", "matchCriteriaId": "51AA7383-3AA1-4A3B-BA46-BBA8FBDC10DD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hp:system_management_homepage:*:*:*:*:*:*:*:*", "matchCriteriaId": "D06BF4CE-299F-42E4-BA0A-5D68788C92DF", "versionEndIncluding": "7.5.3.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:enterprise_manager_ops_center:12.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "BA2CF507-AA3F-464C-88DF-71E30672E623", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:enterprise_manager_ops_center:12.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "BE12B6A4-E128-41EC-8017-558F50B961BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "0F8B45C6-A877-4317-BCE5-EF9E9542276A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:glassfish_server:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "A56AAEB5-E5A5-44A4-8B82-0C465122F2C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:glassfish_server:3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "5C8196D0-06A9-4A0B-8864-AA8E8CF2DDB0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The smb_request_state function in cURL and libcurl 7.40.0 through 7.42.1 allows remote SMB servers to obtain sensitive information from memory or cause a denial of service (out-of-bounds read and crash) via crafted length and offset values." }, { "lang": "es", "value": "La funci\u00f3n smb_request_state en cURL y libcurl 7.40.0 hasta 7.42.1 permite a servidores SMB remotos obtener informaci\u00f3n sensible de la memoria o causar una denegaci\u00f3n de servicio (lectura fuera de rango y ca\u00edda) a trav\u00e9s de valores de longitud y desplazamiento manipulados." } ], "id": "CVE-2015-3237", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-06-22T19:59:04.653", "references": [ { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://curl.haxx.se/docs/adv_20150617B.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160660.html" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" }, { "source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/75387" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/91787" }, { "source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id/1036371" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05111017" }, { "source": "secalert@redhat.com", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380" }, { "source": "secalert@redhat.com", "url": "https://security.gentoo.org/glsa/201509-02" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://curl.haxx.se/docs/adv_20150617B.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160660.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/75387" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/91787" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1036371" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05111017" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201509-02" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-02-06 20:29
Modified
2024-11-21 03:53
Severity ?
Summary
libcurl versions from 7.36.0 to before 7.64.0 is vulnerable to a heap buffer out-of-bounds read. The function handling incoming NTLM type-2 messages (`lib/vauth/ntlm.c:ntlm_decode_type2_target`) does not validate incoming data correctly and is subject to an integer overflow vulnerability. Using that overflow, a malicious or broken NTLM server could trick libcurl to accept a bad length + offset combination that would lead to a buffer read out-of-bounds.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://www.securityfocus.com/bid/106947 | Third Party Advisory, VDB Entry | |
secalert@redhat.com | https://access.redhat.com/errata/RHSA-2019:3701 | Third Party Advisory | |
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16890 | Issue Tracking, Mitigation, Patch, Third Party Advisory | |
secalert@redhat.com | https://cert-portal.siemens.com/productcert/pdf/ssa-436177.pdf | Third Party Advisory | |
secalert@redhat.com | https://curl.haxx.se/docs/CVE-2018-16890.html | Patch, Vendor Advisory | |
secalert@redhat.com | https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f%40%3Cdevnull.infra.apache.org%3E | ||
secalert@redhat.com | https://security.netapp.com/advisory/ntap-20190315-0001/ | Patch, Third Party Advisory | |
secalert@redhat.com | https://support.f5.com/csp/article/K03314397?utm_source=f5support&%3Butm_medium=RSS | ||
secalert@redhat.com | https://usn.ubuntu.com/3882-1/ | Third Party Advisory | |
secalert@redhat.com | https://www.debian.org/security/2019/dsa-4386 | Third Party Advisory | |
secalert@redhat.com | https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html | Patch, Third Party Advisory | |
secalert@redhat.com | https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/106947 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2019:3701 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16890 | Issue Tracking, Mitigation, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-436177.pdf | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://curl.haxx.se/docs/CVE-2018-16890.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f%40%3Cdevnull.infra.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20190315-0001/ | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.f5.com/csp/article/K03314397?utm_source=f5support&%3Butm_medium=RSS | ||
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3882-1/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2019/dsa-4386 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html | Patch, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
haxx | libcurl | * | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 16.04 | |
canonical | ubuntu_linux | 18.04 | |
canonical | ubuntu_linux | 18.10 | |
debian | debian_linux | 9.0 | |
netapp | clustered_data_ontap | * | |
siemens | sinema_remote_connect_client | * | |
oracle | communications_operations_monitor | 3.4 | |
oracle | communications_operations_monitor | 4.0 | |
oracle | http_server | 12.2.1.3.0 | |
oracle | secure_global_desktop | 5.4 | |
redhat | enterprise_linux | 8.0 | |
f5 | big-ip_access_policy_manager | * | |
f5 | big-ip_access_policy_manager | * | |
f5 | big-ip_access_policy_manager | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*", "matchCriteriaId": "0572AA2C-5E33-4612-8BDE-0859690EA089", "versionEndExcluding": "7.64.0", "versionStartIncluding": "7.36.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*", "matchCriteriaId": "07C312A0-CD2C-4B9C-B064-6409B25C278F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:clustered_data_ontap:*:*:*:*:*:*:*:*", "matchCriteriaId": "B0E976A9-6253-4DF5-9370-471D0469B395", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:sinema_remote_connect_client:*:*:*:*:*:*:*:*", "matchCriteriaId": "626EEBF4-73B9-44B3-BF55-50EC9139EF66", "versionEndIncluding": "2.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:communications_operations_monitor:3.4:*:*:*:*:*:*:*", "matchCriteriaId": "D52F557F-D0A0-43D3-85F1-F10B6EBFAEDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_operations_monitor:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "E3517A27-E6EE-497C-9996-F78171BBE90F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "DFC79B17-E9D2-44D5-93ED-2F959E7A3D43", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:secure_global_desktop:5.4:*:*:*:*:*:*:*", "matchCriteriaId": "B5265C91-FF5C-4451-A7C2-D388A65ACFA2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "6FCB6C17-33AC-4E5E-8633-7490058CA51F", "versionEndIncluding": "13.1.3", "versionStartIncluding": "13.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "FCBAF5C1-3761-47BB-AD8E-A55A64D33AF3", "versionEndIncluding": "14.1.2", "versionStartIncluding": "14.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "D6A53E3C-3E09-4100-8D5A-10AD4973C230", "versionEndIncluding": "15.0.1", "versionStartIncluding": "15.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "libcurl versions from 7.36.0 to before 7.64.0 is vulnerable to a heap buffer out-of-bounds read. The function handling incoming NTLM type-2 messages (`lib/vauth/ntlm.c:ntlm_decode_type2_target`) does not validate incoming data correctly and is subject to an integer overflow vulnerability. Using that overflow, a malicious or broken NTLM server could trick libcurl to accept a bad length + offset combination that would lead to a buffer read out-of-bounds." }, { "lang": "es", "value": "Libcurl, desde la versi\u00f3n 7.36.0 hasta antes de la 7.64.0, es vulnerable a una lectura de memoria din\u00e1mica (heap) fuera de l\u00edmites. La funci\u00f3n que gestiona los mensajes entrantes NTLM de tipo 2 (\"lib/vauth/ntlm.c:ntlm_decode_type2_target\") no valida los datos entrantes correctamente y est\u00e1 sujeta a una vulnerabilidad de desbordamiento de enteros. Mediante ese desbordamiento, un servidor NTLM malicioso o roto podr\u00eda enga\u00f1ar a libcurl para que acepte una mala combinaci\u00f3n de longitud + desplazamiento que conducir\u00eda a una lectura del b\u00fafer fuera de l\u00edmites." } ], "id": "CVE-2018-16890", "lastModified": "2024-11-21T03:53:32.740", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.5, "source": "secalert@redhat.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-02-06T20:29:00.243", "references": [ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106947" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3701" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Mitigation", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16890" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-436177.pdf" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://curl.haxx.se/docs/CVE-2018-16890.html" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f%40%3Cdevnull.infra.apache.org%3E" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20190315-0001/" }, { "source": "secalert@redhat.com", "url": "https://support.f5.com/csp/article/K03314397?utm_source=f5support\u0026amp%3Butm_medium=RSS" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3882-1/" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2019/dsa-4386" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106947" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3701" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Mitigation", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16890" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-436177.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://curl.haxx.se/docs/CVE-2018-16890.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f%40%3Cdevnull.infra.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20190315-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.f5.com/csp/article/K03314397?utm_source=f5support\u0026amp%3Butm_medium=RSS" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3882-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2019/dsa-4386" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "secalert@redhat.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-125" }, { "lang": "en", "value": "CWE-190" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-04-01 18:15
Modified
2025-06-09 15:15
Severity ?
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Summary
curl 7.1.1 to and including 7.75.0 is vulnerable to an "Exposure of Private Personal Information to an Unauthorized Actor" by leaking credentials in the HTTP Referer: header. libcurl does not strip off user credentials from the URL when automatically populating the Referer: HTTP request header field in outgoing HTTP requests, and therefore risks leaking sensitive data to the server that is the target of the second HTTP request.
References
▶ | URL | Tags | |
---|---|---|---|
support@hackerone.com | https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf | Patch, Third Party Advisory | |
support@hackerone.com | https://curl.se/docs/CVE-2021-22876.html | Patch, Vendor Advisory | |
support@hackerone.com | https://hackerone.com/reports/1101882 | Exploit, Issue Tracking, Patch, Third Party Advisory | |
support@hackerone.com | https://lists.debian.org/debian-lts-announce/2021/05/msg00019.html | Mailing List, Third Party Advisory | |
support@hackerone.com | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP/ | Mailing List, Third Party Advisory | |
support@hackerone.com | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC/ | Mailing List, Third Party Advisory | |
support@hackerone.com | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ/ | Mailing List, Third Party Advisory | |
support@hackerone.com | https://security.gentoo.org/glsa/202105-36 | Third Party Advisory | |
support@hackerone.com | https://security.netapp.com/advisory/ntap-20210521-0007/ | Third Party Advisory | |
support@hackerone.com | https://www.oracle.com//security-alerts/cpujul2021.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://curl.se/docs/CVE-2021-22876.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://hackerone.com/reports/1101882 | Exploit, Issue Tracking, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2021/05/msg00019.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP/ | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC/ | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ/ | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/202105-36 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20210521-0007/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com//security-alerts/cpujul2021.html | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
haxx | libcurl | * | |
fedoraproject | fedora | 32 | |
fedoraproject | fedora | 33 | |
fedoraproject | fedora | 34 | |
netapp | hci_management_node | - | |
netapp | solidfire | - | |
netapp | hci_compute_node | - | |
netapp | hci_storage_node | - | |
broadcom | fabric_operating_system | - | |
debian | debian_linux | 9.0 | |
siemens | sinec_infrastructure_network_services | * | |
oracle | communications_billing_and_revenue_management | 12.0.0.3.0 | |
oracle | essbase | 21.2 | |
splunk | universal_forwarder | * | |
splunk | universal_forwarder | * | |
splunk | universal_forwarder | 9.1.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*", "matchCriteriaId": "E7911980-1217-467C-8423-6D8928FACF70", "versionEndIncluding": "7.75.0", "versionStartIncluding": "7.1.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3C19813-E823-456A-B1CE-EC0684CE1953", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6E9EF0C-AFA8-4F7B-9FDC-1E0F7C26E737", "vulnerable": true }, { "criteria": "cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD7447BC-F315-4298-A822-549942FC118B", "vulnerable": true }, { "criteria": "cpe:2.3:h:netapp:hci_storage_node:-:*:*:*:*:*:*:*", "matchCriteriaId": "02DEB4FB-A21D-4CB1-B522-EEE5093E8521", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:broadcom:fabric_operating_system:-:*:*:*:*:*:*:*", "matchCriteriaId": "046FB51E-B768-44D3-AEB5-D857145CA840", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*", "matchCriteriaId": "B0F46497-4AB0-49A7-9453-CC26837BF253", "versionEndExcluding": "1.0.1.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E39D442D-1997-49AF-8B02-5640BE2A26CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:essbase:21.2:*:*:*:*:*:*:*", "matchCriteriaId": "394A16F2-CCD4-44E5-BF6B-E0C782A9FA38", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:*", "matchCriteriaId": "5722E753-75DE-4944-A11B-556CB299B57D", "versionEndExcluding": "8.2.12", "versionStartIncluding": "8.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:*", "matchCriteriaId": "DC0F9351-81A4-4FEA-B6B5-6E960A933D32", "versionEndExcluding": "9.0.6", "versionStartIncluding": "9.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:splunk:universal_forwarder:9.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "EED24E67-2957-4C1B-8FEA-E2D2FE7B97FC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "curl 7.1.1 to and including 7.75.0 is vulnerable to an \"Exposure of Private Personal Information to an Unauthorized Actor\" by leaking credentials in the HTTP Referer: header. libcurl does not strip off user credentials from the URL when automatically populating the Referer: HTTP request header field in outgoing HTTP requests, and therefore risks leaking sensitive data to the server that is the target of the second HTTP request." }, { "lang": "es", "value": "curl versiones 7.1.1 hasta 7.75.0 incluy\u00e9ndola, es vulnerable a una \"Exposure of Private Personal Information to an Unauthorized Actor\" al filtrar credenciales en el encabezado HTTP Referer:.\u0026#xa0;libcurl no elimina las credenciales de usuario de la URL cuando completa autom\u00e1ticamente el campo de encabezado de petici\u00f3n HTTP Referer: en peticiones HTTP salientes y, por lo tanto, corre el riesgo de filtrar datos confidenciales al servidor que es el objetivo de la segunda petici\u00f3n HTTP." } ], "id": "CVE-2021-22876", "lastModified": "2025-06-09T15:15:23.067", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2021-04-01T18:15:12.823", "references": [ { "source": "support@hackerone.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "source": "support@hackerone.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://curl.se/docs/CVE-2021-22876.html" }, { "source": "support@hackerone.com", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://hackerone.com/reports/1101882" }, { "source": "support@hackerone.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00019.html" }, { "source": "support@hackerone.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP/" }, { "source": "support@hackerone.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC/" }, { "source": "support@hackerone.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ/" }, { "source": "support@hackerone.com", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202105-36" }, { "source": "support@hackerone.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210521-0007/" }, { "source": "support@hackerone.com", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://curl.se/docs/CVE-2021-22876.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://hackerone.com/reports/1101882" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00019.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202105-36" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210521-0007/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" } ], "sourceIdentifier": "support@hackerone.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-359" } ], "source": "support@hackerone.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-10-05 01:29
Modified
2025-04-20 01:37
Severity ?
Summary
When doing a TFTP transfer and curl/libcurl is given a URL that contains a very long file name (longer than about 515 bytes), the file name is truncated to fit within the buffer boundaries, but the buffer size is still wrongly updated to use the untruncated length. This too large value is then used in the sendto() call, making curl attempt to send more data than what is actually put into the buffer. The endto() function will then read beyond the end of the heap based buffer. A malicious HTTP(S) server could redirect a vulnerable libcurl-using client to a crafted TFTP URL (if the client hasn't restricted which protocols it allows redirects to) and trick it to send private memory contents to a remote server over UDP. Limit curl's redirect protocols with --proto-redir and libcurl's with CURLOPT_REDIR_PROTOCOLS.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.debian.org/security/2017/dsa-3992 | ||
cve@mitre.org | http://www.securityfocus.com/bid/100286 | Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.securitytracker.com/id/1039118 | Third Party Advisory, VDB Entry | |
cve@mitre.org | https://access.redhat.com/errata/RHSA-2018:3558 | ||
cve@mitre.org | https://curl.haxx.se/docs/adv_20170809B.html | Patch, Vendor Advisory | |
cve@mitre.org | https://security.gentoo.org/glsa/201709-14 | Patch, Third Party Advisory, VDB Entry | |
cve@mitre.org | https://support.apple.com/HT208221 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2017/dsa-3992 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/100286 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1039118 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:3558 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://curl.haxx.se/docs/adv_20170809B.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/201709-14 | Patch, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/HT208221 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
haxx | libcurl | 7.15.0 | |
haxx | libcurl | 7.15.1 | |
haxx | libcurl | 7.15.2 | |
haxx | libcurl | 7.15.3 | |
haxx | libcurl | 7.15.4 | |
haxx | libcurl | 7.15.5 | |
haxx | libcurl | 7.16.0 | |
haxx | libcurl | 7.16.1 | |
haxx | libcurl | 7.16.2 | |
haxx | libcurl | 7.16.3 | |
haxx | libcurl | 7.16.4 | |
haxx | libcurl | 7.17.0 | |
haxx | libcurl | 7.17.1 | |
haxx | libcurl | 7.18.0 | |
haxx | libcurl | 7.18.1 | |
haxx | libcurl | 7.18.2 | |
haxx | libcurl | 7.19.0 | |
haxx | libcurl | 7.19.1 | |
haxx | libcurl | 7.19.2 | |
haxx | libcurl | 7.19.3 | |
haxx | libcurl | 7.19.4 | |
haxx | libcurl | 7.19.5 | |
haxx | libcurl | 7.19.6 | |
haxx | libcurl | 7.19.7 | |
haxx | libcurl | 7.20.0 | |
haxx | libcurl | 7.20.1 | |
haxx | libcurl | 7.21.0 | |
haxx | libcurl | 7.21.1 | |
haxx | libcurl | 7.21.2 | |
haxx | libcurl | 7.21.3 | |
haxx | libcurl | 7.21.4 | |
haxx | libcurl | 7.21.5 | |
haxx | libcurl | 7.21.6 | |
haxx | libcurl | 7.21.7 | |
haxx | libcurl | 7.22.0 | |
haxx | libcurl | 7.23.0 | |
haxx | libcurl | 7.23.1 | |
haxx | libcurl | 7.24.0 | |
haxx | libcurl | 7.25.0 | |
haxx | libcurl | 7.26.0 | |
haxx | libcurl | 7.27.0 | |
haxx | libcurl | 7.28.0 | |
haxx | libcurl | 7.28.1 | |
haxx | libcurl | 7.29.0 | |
haxx | libcurl | 7.30.0 | |
haxx | libcurl | 7.31.0 | |
haxx | libcurl | 7.32.0 | |
haxx | libcurl | 7.33.0 | |
haxx | libcurl | 7.34.0 | |
haxx | libcurl | 7.35.0 | |
haxx | libcurl | 7.36.0 | |
haxx | libcurl | 7.37.0 | |
haxx | libcurl | 7.37.1 | |
haxx | libcurl | 7.38.0 | |
haxx | libcurl | 7.39 | |
haxx | libcurl | 7.40.0 | |
haxx | libcurl | 7.41.0 | |
haxx | libcurl | 7.42.0 | |
haxx | libcurl | 7.42.1 | |
haxx | libcurl | 7.43.0 | |
haxx | libcurl | 7.44.0 | |
haxx | libcurl | 7.45.0 | |
haxx | libcurl | 7.46.0 | |
haxx | libcurl | 7.47.0 | |
haxx | libcurl | 7.47.1 | |
haxx | libcurl | 7.48.0 | |
haxx | libcurl | 7.49.0 | |
haxx | libcurl | 7.49.1 | |
haxx | libcurl | 7.50.0 | |
haxx | libcurl | 7.50.1 | |
haxx | libcurl | 7.50.2 | |
haxx | libcurl | 7.50.3 | |
haxx | libcurl | 7.51.0 | |
haxx | libcurl | 7.52.0 | |
haxx | libcurl | 7.52.1 | |
haxx | libcurl | 7.53.0 | |
haxx | libcurl | 7.53.1 | |
haxx | libcurl | 7.54.0 | |
haxx | libcurl | 7.54.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:haxx:libcurl:7.15.0:*:*:*:*:*:*:*", "matchCriteriaId": "60BBDF07-DB97-433E-B542-EFEBE45550DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.15.1:*:*:*:*:*:*:*", "matchCriteriaId": "CA8BE3F8-82ED-4DD7-991E-979E950C98B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.15.2:*:*:*:*:*:*:*", "matchCriteriaId": "738AA231-4694-46E8-B559-1594263A9987", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.15.3:*:*:*:*:*:*:*", "matchCriteriaId": "E9E1F171-B887-499A-BF4F-538EBF347811", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.15.4:*:*:*:*:*:*:*", "matchCriteriaId": "07AA276A-0EBA-4DC9-951C-8F8159FAC7A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.15.5:*:*:*:*:*:*:*", "matchCriteriaId": "8DEEF534-9AD2-4439-9D69-E91D062C4647", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.16.0:*:*:*:*:*:*:*", "matchCriteriaId": "63643BE1-C978-4CD2-8ED1-2B979DB0676E", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.16.1:*:*:*:*:*:*:*", "matchCriteriaId": "F6FA04A0-9258-4654-ABCF-F41340B1FA35", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.16.2:*:*:*:*:*:*:*", "matchCriteriaId": "DE829230-AFDB-4131-9C6A-D9D7A66C5B57", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.16.3:*:*:*:*:*:*:*", "matchCriteriaId": "B7E8BA30-8087-48D4-AE1B-48326FF826B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.16.4:*:*:*:*:*:*:*", "matchCriteriaId": "47970EFF-2F51-4875-A6BD-E30614E13278", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.17.0:*:*:*:*:*:*:*", "matchCriteriaId": "52C9B668-3204-41C5-A82E-262BDFA541DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*", "matchCriteriaId": "08C8EE1E-E186-42D6-8B12-05865C73F261", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*", "matchCriteriaId": "EEA3D88B-41B9-4D79-B47D-B3D6058C0C27", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.18.1:*:*:*:*:*:*:*", "matchCriteriaId": "C2C80901-D48E-4C2A-9BED-A40007A11C97", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*", "matchCriteriaId": "331A51E4-AA73-486F-9618-5A83965F2436", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.0:*:*:*:*:*:*:*", "matchCriteriaId": "EB32DF2C-9208-4853-ADEB-B00D764D7467", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.1:*:*:*:*:*:*:*", "matchCriteriaId": "E05636DC-7E38-4605-AAB8-81C0AE37520A", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.2:*:*:*:*:*:*:*", "matchCriteriaId": "624DF2F1-53FD-48D3-B93D-44E99C9C0C5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*", "matchCriteriaId": "F2171C7C-311A-4405-B95F-3A54966FA844", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.4:*:*:*:*:*:*:*", "matchCriteriaId": "5DE20A41-8B53-46FC-9002-69CC7495171F", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.5:*:*:*:*:*:*:*", "matchCriteriaId": "87ED9DA0-E880-4CBB-B1AC-5AEE8A004718", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.6:*:*:*:*:*:*:*", "matchCriteriaId": "5293C7F0-BF9F-4768-889A-876CE78903CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.7:*:*:*:*:*:*:*", "matchCriteriaId": "F3EB41B3-65F3-4B0E-8CCC-325B14AF605B", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "857B244C-2AFB-40C7-A893-7C6DE9871BCE", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.20.1:*:*:*:*:*:*:*", "matchCriteriaId": "B732CE55-820A-40E0-A885-71BBB6CF8C15", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.0:*:*:*:*:*:*:*", "matchCriteriaId": "0455A5F2-1515-4CD8-BA2F-74D28E91A661", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.1:*:*:*:*:*:*:*", "matchCriteriaId": "29034B3A-BE9D-4D68-8C56-4465C03C3693", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*", "matchCriteriaId": "6249538E-FBCB-4130-91FB-DA78D7BA45DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.3:*:*:*:*:*:*:*", "matchCriteriaId": "5E11B8A5-50A2-468F-BFB3-86DD9D28AC73", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.4:*:*:*:*:*:*:*", "matchCriteriaId": "9EAE25A0-3828-46F1-AB30-88732CBC9F38", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.5:*:*:*:*:*:*:*", "matchCriteriaId": "1533A85C-2160-445D-8787-E624AEDC5A0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.6:*:*:*:*:*:*:*", "matchCriteriaId": "D87B9393-7EA4-43DA-900C-7E840AE2D4C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.7:*:*:*:*:*:*:*", "matchCriteriaId": "7D1249E9-304F-4952-8DAB-8B79CE5E7D54", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*", "matchCriteriaId": "83FAF953-6A65-4FAB-BDB5-03B468CD1C9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*", "matchCriteriaId": "29F8FF1F-A639-4161-9366-62528AAF4C07", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.23.1:*:*:*:*:*:*:*", "matchCriteriaId": "812AB429-379A-4EDE-9664-5BC2989053F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.24.0:*:*:*:*:*:*:*", "matchCriteriaId": "13DD791F-C4BD-4456-955A-92E84082AA09", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.25.0:*:*:*:*:*:*:*", "matchCriteriaId": "4A17E442-45AA-4780-98B4-9BF764DCC1C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*", "matchCriteriaId": "F6AF544C-5F16-4434-B9FB-93B1B7318950", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*", "matchCriteriaId": "CBFD9ED9-2412-44AE-9C55-0ED03A121B23", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*", "matchCriteriaId": "67CCE31B-ABDA-4F32-BAF1-B1AD0664B3E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*", "matchCriteriaId": "9E66A332-ECD1-4452-B444-FB629022FDF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.29.0:*:*:*:*:*:*:*", "matchCriteriaId": "CDD3D599-35E9-4590-B5E0-3AF04D344695", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.30.0:*:*:*:*:*:*:*", "matchCriteriaId": "A3B6BFFB-7967-482C-9B49-4BD25C815299", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*", "matchCriteriaId": "1791BF6D-2C96-4A6E-90D4-2906A73601F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*", "matchCriteriaId": "260DD751-4145-4B75-B892-5FC932C6A305", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*", "matchCriteriaId": "EFF4AD0D-2EC5-4CE8-B6B3-2EC8ED2FF118", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*", "matchCriteriaId": "3EB1CB85-0A9B-4816-B471-278774EE6D4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*", "matchCriteriaId": "3831AB03-4E7E-476D-9623-58AADC188DFE", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*", "matchCriteriaId": "ABACE305-2F0C-4B59-BC5C-6DF162B450E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*", "matchCriteriaId": "6FAC1B55-F492-484E-B837-E7745682DE0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.37.1:*:*:*:*:*:*:*", "matchCriteriaId": "E0D57914-B40A-462B-9C78-6433BE2B2DB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.38.0:*:*:*:*:*:*:*", "matchCriteriaId": "A9A12DF7-62C5-46AD-9236-E2821C64156E", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.39:*:*:*:*:*:*:*", "matchCriteriaId": "4C43697D-390A-4AC0-A5D8-62B6D22245BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.40.0:*:*:*:*:*:*:*", "matchCriteriaId": "D52E9E9F-7A35-4CB9-813E-5A1D4A36415C", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.41.0:*:*:*:*:*:*:*", "matchCriteriaId": "257291FB-969C-4413-BA81-806B5E1B40A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.42.0:*:*:*:*:*:*:*", "matchCriteriaId": "88DC6ED5-4C1A-4ED0-97BA-B245C4A236C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.42.1:*:*:*:*:*:*:*", "matchCriteriaId": "51AA7383-3AA1-4A3B-BA46-BBA8FBDC10DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.43.0:*:*:*:*:*:*:*", "matchCriteriaId": "003D8430-AA07-41B5-9F22-696C554CB277", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.44.0:*:*:*:*:*:*:*", "matchCriteriaId": "6C3ED21E-7907-4248-A32F-BB3102A80DC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.45.0:*:*:*:*:*:*:*", "matchCriteriaId": "B2E41520-CA31-4BA0-B247-F1DCAAE98DD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.46.0:*:*:*:*:*:*:*", "matchCriteriaId": "57F2C633-D720-4FD9-9C75-2D4C57120357", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.47.0:*:*:*:*:*:*:*", "matchCriteriaId": "A8F2FBC9-059A-4299-B59F-8EFD797E3704", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.47.1:*:*:*:*:*:*:*", "matchCriteriaId": "920FCC26-B458-46D8-B023-DB4C19A51718", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.48.0:*:*:*:*:*:*:*", "matchCriteriaId": "B21C08D5-7454-4292-A87C-900C9494E38B", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.49.0:*:*:*:*:*:*:*", "matchCriteriaId": "3B727926-90A2-4A7E-9905-70160C1E0D8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.49.1:*:*:*:*:*:*:*", "matchCriteriaId": "C1A247AE-B209-42BE-8BE7-865AE279D23E", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.50.0:*:*:*:*:*:*:*", "matchCriteriaId": "8429FF9B-D7EA-40E6-A6E8-961EA71F20C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.50.1:*:*:*:*:*:*:*", "matchCriteriaId": "9D387194-720A-4D9C-928E-6FAF2EC6C33C", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.50.2:*:*:*:*:*:*:*", "matchCriteriaId": "F2782D32-B023-47B1-A513-251D5093CE5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.50.3:*:*:*:*:*:*:*", "matchCriteriaId": "8373A4E6-BA92-4B5B-9E97-E8C1E8C22C13", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.51.0:*:*:*:*:*:*:*", "matchCriteriaId": "084F63A4-64E4-48FC-8B8C-A4F3E7D39D08", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.52.0:*:*:*:*:*:*:*", "matchCriteriaId": "F0D4DFF0-9953-4AB8-8C24-3977448BFE64", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.52.1:*:*:*:*:*:*:*", "matchCriteriaId": "1B5B274B-F232-47E8-9E8A-0EB08F97DE40", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.53.0:*:*:*:*:*:*:*", "matchCriteriaId": "73E42C72-868A-4AE4-A33E-79F8190C94C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.53.1:*:*:*:*:*:*:*", "matchCriteriaId": "24E2F3C4-5D88-4C16-BAA7-A34CF7687415", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.54.0:*:*:*:*:*:*:*", "matchCriteriaId": "067EB50A-E70F-4C04-ACE7-67BD7E5A4344", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.54.1:*:*:*:*:*:*:*", "matchCriteriaId": "7C1D4922-F424-45B1-AF98-B1DD33981110", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "When doing a TFTP transfer and curl/libcurl is given a URL that contains a very long file name (longer than about 515 bytes), the file name is truncated to fit within the buffer boundaries, but the buffer size is still wrongly updated to use the untruncated length. This too large value is then used in the sendto() call, making curl attempt to send more data than what is actually put into the buffer. The endto() function will then read beyond the end of the heap based buffer. A malicious HTTP(S) server could redirect a vulnerable libcurl-using client to a crafted TFTP URL (if the client hasn\u0027t restricted which protocols it allows redirects to) and trick it to send private memory contents to a remote server over UDP. Limit curl\u0027s redirect protocols with --proto-redir and libcurl\u0027s with CURLOPT_REDIR_PROTOCOLS." }, { "lang": "es", "value": "A la hora de hacer una transferencia TFTP y proporcionar una URL con un nombre de archivo muy grande (mayor que 515 bytes) en curl/libcurl, el nombre de archivo se trunca para que entre en los l\u00edmites del b\u00fafer, pero el tama\u00f1o del b\u00fafer se sigue actualizando err\u00f3neamente para usar la longitud no truncada. Este valor excesivamente grande se utiliza luego en la llamada sendto(), lo que hace que un intento curl env\u00ede m\u00e1s datos que los que est\u00e1n realmente puestos en el b\u00fafer. La funci\u00f3n endto() lee entonces m\u00e1s all\u00e1 del final del b\u00fafer basado en la memoria din\u00e1mica (heap). Un servidor HTTP(S) malicioso podr\u00eda redirigir un cliente vulnerable que utiliza libcurl a una URL TFTP manipulada (si el cliente no tuviese restringidos a qu\u00e9 protocolos se permiten redirecciones) y enga\u00f1arle para que env\u00ede contenidos privados de la memoria a un servidor remoto por UDP. Limite los protocolos de redirecci\u00f3n de curl con --proto-redir y los de libcurl, con CURLOPT_REDIR_PROTOCOLS." } ], "id": "CVE-2017-1000100", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-10-05T01:29:04.057", "references": [ { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2017/dsa-3992" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/100286" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039118" }, { "source": "cve@mitre.org", "url": "https://access.redhat.com/errata/RHSA-2018:3558" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://curl.haxx.se/docs/adv_20170809B.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory", "VDB Entry" ], "url": "https://security.gentoo.org/glsa/201709-14" }, { "source": "cve@mitre.org", "url": "https://support.apple.com/HT208221" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2017/dsa-3992" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/100286" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039118" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2018:3558" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://curl.haxx.se/docs/adv_20170809B.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory", "VDB Entry" ], "url": "https://security.gentoo.org/glsa/201709-14" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.apple.com/HT208221" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-04-24 14:59
Modified
2025-04-12 10:46
Severity ?
Summary
The fix_hostname function in cURL and libcurl 7.37.0 through 7.41.0 does not properly calculate an index, which allows remote attackers to cause a denial of service (out-of-bounds read or write and crash) or possibly have other unspecified impact via a zero-length host name, as demonstrated by "http://:80" and ":80."
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://curl.haxx.se/docs/adv_20150422D.html | Vendor Advisory | |
secalert@redhat.com | http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743 | ||
secalert@redhat.com | http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html | ||
secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155957.html | ||
secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156945.html | ||
secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157017.html | ||
secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157188.html | ||
secalert@redhat.com | http://lists.opensuse.org/opensuse-updates/2015-04/msg00057.html | ||
secalert@redhat.com | http://www.debian.org/security/2015/dsa-3232 | ||
secalert@redhat.com | http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html | ||
secalert@redhat.com | http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html | ||
secalert@redhat.com | http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html | ||
secalert@redhat.com | http://www.securityfocus.com/bid/74300 | ||
secalert@redhat.com | http://www.securitytracker.com/id/1032232 | ||
secalert@redhat.com | http://www.ubuntu.com/usn/USN-2591-1 | ||
secalert@redhat.com | https://security.gentoo.org/glsa/201509-02 | ||
secalert@redhat.com | https://support.apple.com/kb/HT205031 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://curl.haxx.se/docs/adv_20150422D.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155957.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156945.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157017.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157188.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-updates/2015-04/msg00057.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2015/dsa-3232 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/74300 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1032232 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-2591-1 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/201509-02 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT205031 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
oracle | mysql_enterprise_monitor | * | |
oracle | mysql_enterprise_monitor | * | |
haxx | curl | 7.37.0 | |
haxx | curl | 7.37.1 | |
haxx | curl | 7.38.0 | |
haxx | curl | 7.39.0 | |
haxx | curl | 7.40.0 | |
haxx | curl | 7.41.0 | |
haxx | libcurl | 7.37.0 | |
haxx | libcurl | 7.37.1 | |
haxx | libcurl | 7.38.0 | |
haxx | libcurl | 7.39 | |
haxx | libcurl | 7.40.0 | |
haxx | libcurl | 7.41.0 | |
canonical | ubuntu_linux | 12.04 | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 14.10 | |
canonical | ubuntu_linux | 15.04 | |
debian | debian_linux | 7.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*", "matchCriteriaId": "5F8B75B8-1CCD-47BC-B6AB-0317FAD81437", "versionEndIncluding": "2.3.20", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*", "matchCriteriaId": "E746A528-22B2-4FB3-BF7C-78884705E780", "versionEndIncluding": "3.0.22", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:haxx:curl:7.37.0:*:*:*:*:*:*:*", "matchCriteriaId": "6FC1313E-8DCB-4B29-A9BC-A27C8CB360E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.37.1:*:*:*:*:*:*:*", "matchCriteriaId": "B27C2E02-5C0A-4A12-B0A6-5B1C0DFA94E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.38.0:*:*:*:*:*:*:*", "matchCriteriaId": "EFC7535F-B8C7-490F-A2F9-1DCFD41A3C9B", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.39.0:*:*:*:*:*:*:*", "matchCriteriaId": "3CCBFE6D-F6A9-4394-9AF8-F830DC7E6A81", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.40.0:*:*:*:*:*:*:*", "matchCriteriaId": "5DEBBFCA-6A18-4F8F-B841-50255C952FA0", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.41.0:*:*:*:*:*:*:*", "matchCriteriaId": "FEEAE437-A645-468B-B283-44799658F534", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*", "matchCriteriaId": "6FAC1B55-F492-484E-B837-E7745682DE0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.37.1:*:*:*:*:*:*:*", "matchCriteriaId": "E0D57914-B40A-462B-9C78-6433BE2B2DB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.38.0:*:*:*:*:*:*:*", "matchCriteriaId": "A9A12DF7-62C5-46AD-9236-E2821C64156E", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.39:*:*:*:*:*:*:*", "matchCriteriaId": "4C43697D-390A-4AC0-A5D8-62B6D22245BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.40.0:*:*:*:*:*:*:*", "matchCriteriaId": "D52E9E9F-7A35-4CB9-813E-5A1D4A36415C", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.41.0:*:*:*:*:*:*:*", "matchCriteriaId": "257291FB-969C-4413-BA81-806B5E1B40A7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*", "matchCriteriaId": "49A63F39-30BE-443F-AF10-6245587D3359", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*", "matchCriteriaId": "F38D3B7E-8429-473F-BB31-FC3583EE5A5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The fix_hostname function in cURL and libcurl 7.37.0 through 7.41.0 does not properly calculate an index, which allows remote attackers to cause a denial of service (out-of-bounds read or write and crash) or possibly have other unspecified impact via a zero-length host name, as demonstrated by \"http://:80\" and \":80.\"" }, { "lang": "es", "value": "La funci\u00f3n fix_hostname en cURL y libcurl 7.37.0 hasta 7.41.0 no calcula correctamente un indice, lo que permite a atacantes remotos causar una denegaci\u00f3n de servicio (lectura o escritura fuera de rango y ca\u00edda) o posiblemente tener otro impacto no especificado a trav\u00e9s de un nombre de anfitri\u00f3n de longitud cero, tal y como fue demostrado por \u0027http://:80\u0027 y \u0027:80.\u0027" } ], "evaluatorComment": "The previous CVSS assessment 7.5 (AV:N/AC:L/AU:N/C:P/I:P/A:P) was provided at the time of initial analysis based on the best available published information at that time. The score has been updated to reflect the impact to Oracle products per \u003ca href=http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html\u003e Oracle Critical Patch Update Advisory - October 2015 \u003c/a\u003e. Other products listed as vulnerable may or may not be similarly impacted.\n\nAlso Per \u003ca href=http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html\u003e Oracle Critical Patch Update Advisory - October 2015 \u003c/a\u003e -\nThis fix also addresses CVE-2014-3707, CVE-2014-8150, CVE-2015-3153 and CVE-2015-3236. The CVSS score is 9.0 if MySQL Enterprise Monitor runs with admin or root privileges. The score would be 6.5 if MySQL Enterprise Monitor runs with non-admin privileges and the impact on Confidentiality, Integrity and Availability would be Partial+. The Sub-Component for version 3.0.x is \u0027Proxy/Aggregator\u0027.", "id": "CVE-2015-3144", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-04-24T14:59:09.203", "references": [ { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://curl.haxx.se/docs/adv_20150422D.html" }, { "source": "secalert@redhat.com", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10743" }, { "source": "secalert@redhat.com", "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155957.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156945.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157017.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157188.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00057.html" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2015/dsa-3232" }, { "source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html" }, { "source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/74300" }, { "source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id/1032232" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/USN-2591-1" }, { "source": "secalert@redhat.com", "url": "https://security.gentoo.org/glsa/201509-02" }, { "source": "secalert@redhat.com", "url": "https://support.apple.com/kb/HT205031" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://curl.haxx.se/docs/adv_20150422D.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10743" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155957.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156945.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157017.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157188.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00057.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2015/dsa-3232" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/74300" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1032232" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-2591-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201509-02" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.apple.com/kb/HT205031" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-07-31 13:20
Modified
2025-04-11 00:51
Severity ?
Summary
Heap-based buffer overflow in the curl_easy_unescape function in lib/escape.c in cURL and libcurl 7.7 through 7.30.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted string ending in a "%" (percent) character.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://curl.haxx.se/docs/adv_20130622.html | Vendor Advisory | |
secalert@redhat.com | http://lists.opensuse.org/opensuse-updates/2013-07/msg00013.html | ||
secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2013-0983.html | ||
secalert@redhat.com | http://www.debian.org/security/2013/dsa-2713 | ||
secalert@redhat.com | http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html | ||
secalert@redhat.com | http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html | ||
secalert@redhat.com | http://www.securityfocus.com/bid/60737 | ||
secalert@redhat.com | http://www.ubuntu.com/usn/USN-1894-1 | ||
secalert@redhat.com | https://github.com/bagder/curl/commit/192c4f788d48f82c03e9cef40013f34370e90737 | Exploit, Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://curl.haxx.se/docs/adv_20130622.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-updates/2013-07/msg00013.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2013-0983.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2013/dsa-2713 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/60737 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-1894-1 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/bagder/curl/commit/192c4f788d48f82c03e9cef40013f34370e90737 | Exploit, Patch |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
haxx | curl | 7.7 | |
haxx | curl | 7.7.1 | |
haxx | curl | 7.7.2 | |
haxx | curl | 7.7.3 | |
haxx | curl | 7.8 | |
haxx | curl | 7.8.1 | |
haxx | curl | 7.9 | |
haxx | curl | 7.9.1 | |
haxx | curl | 7.9.2 | |
haxx | curl | 7.9.3 | |
haxx | curl | 7.9.4 | |
haxx | curl | 7.9.5 | |
haxx | curl | 7.9.6 | |
haxx | curl | 7.9.7 | |
haxx | curl | 7.9.8 | |
haxx | curl | 7.10 | |
haxx | curl | 7.10.1 | |
haxx | curl | 7.10.2 | |
haxx | curl | 7.10.3 | |
haxx | curl | 7.10.4 | |
haxx | curl | 7.10.5 | |
haxx | curl | 7.10.6 | |
haxx | curl | 7.10.7 | |
haxx | curl | 7.10.8 | |
haxx | curl | 7.11.0 | |
haxx | curl | 7.11.1 | |
haxx | curl | 7.11.2 | |
haxx | curl | 7.12.0 | |
haxx | curl | 7.12.1 | |
haxx | curl | 7.12.2 | |
haxx | curl | 7.12.3 | |
haxx | curl | 7.13.0 | |
haxx | curl | 7.13.1 | |
haxx | curl | 7.13.2 | |
haxx | curl | 7.14.0 | |
haxx | curl | 7.14.1 | |
haxx | curl | 7.15.0 | |
haxx | curl | 7.15.1 | |
haxx | curl | 7.15.2 | |
haxx | curl | 7.15.3 | |
haxx | curl | 7.15.4 | |
haxx | curl | 7.15.5 | |
haxx | curl | 7.16.0 | |
haxx | curl | 7.16.1 | |
haxx | curl | 7.16.2 | |
haxx | curl | 7.16.3 | |
haxx | curl | 7.16.4 | |
haxx | curl | 7.17.0 | |
haxx | curl | 7.17.1 | |
haxx | curl | 7.18.0 | |
haxx | curl | 7.18.1 | |
haxx | curl | 7.18.2 | |
haxx | curl | 7.19.0 | |
haxx | curl | 7.19.1 | |
haxx | curl | 7.19.2 | |
haxx | curl | 7.19.3 | |
haxx | curl | 7.19.4 | |
haxx | curl | 7.19.5 | |
haxx | curl | 7.19.6 | |
haxx | curl | 7.19.7 | |
haxx | curl | 7.20.0 | |
haxx | curl | 7.20.1 | |
haxx | curl | 7.21.0 | |
haxx | curl | 7.21.1 | |
haxx | curl | 7.21.2 | |
haxx | curl | 7.21.3 | |
haxx | curl | 7.21.4 | |
haxx | curl | 7.21.5 | |
haxx | curl | 7.21.6 | |
haxx | curl | 7.21.7 | |
haxx | curl | 7.22.0 | |
haxx | curl | 7.23.0 | |
haxx | curl | 7.23.1 | |
haxx | curl | 7.24.0 | |
haxx | curl | 7.25.0 | |
haxx | curl | 7.26.0 | |
haxx | curl | 7.27.0 | |
haxx | curl | 7.28.0 | |
haxx | curl | 7.28.1 | |
haxx | curl | 7.29.0 | |
haxx | curl | 7.30.0 | |
haxx | libcurl | 7.7 | |
haxx | libcurl | 7.7.1 | |
haxx | libcurl | 7.7.2 | |
haxx | libcurl | 7.7.3 | |
haxx | libcurl | 7.8 | |
haxx | libcurl | 7.8.1 | |
haxx | libcurl | 7.9 | |
haxx | libcurl | 7.9.1 | |
haxx | libcurl | 7.9.2 | |
haxx | libcurl | 7.9.3 | |
haxx | libcurl | 7.9.4 | |
haxx | libcurl | 7.9.5 | |
haxx | libcurl | 7.9.6 | |
haxx | libcurl | 7.9.7 | |
haxx | libcurl | 7.9.8 | |
haxx | libcurl | 7.10 | |
haxx | libcurl | 7.10.1 | |
haxx | libcurl | 7.10.2 | |
haxx | libcurl | 7.10.3 | |
haxx | libcurl | 7.10.4 | |
haxx | libcurl | 7.10.5 | |
haxx | libcurl | 7.10.6 | |
haxx | libcurl | 7.10.7 | |
haxx | libcurl | 7.10.8 | |
haxx | libcurl | 7.11.0 | |
haxx | libcurl | 7.11.1 | |
haxx | libcurl | 7.11.2 | |
haxx | libcurl | 7.12.0 | |
haxx | libcurl | 7.12.1 | |
haxx | libcurl | 7.12.2 | |
haxx | libcurl | 7.12.3 | |
haxx | libcurl | 7.13.0 | |
haxx | libcurl | 7.13.1 | |
haxx | libcurl | 7.13.2 | |
haxx | libcurl | 7.14.0 | |
haxx | libcurl | 7.14.1 | |
haxx | libcurl | 7.15.0 | |
haxx | libcurl | 7.15.1 | |
haxx | libcurl | 7.15.2 | |
haxx | libcurl | 7.15.3 | |
haxx | libcurl | 7.15.4 | |
haxx | libcurl | 7.15.5 | |
haxx | libcurl | 7.16.0 | |
haxx | libcurl | 7.16.1 | |
haxx | libcurl | 7.16.2 | |
haxx | libcurl | 7.16.3 | |
haxx | libcurl | 7.16.4 | |
haxx | libcurl | 7.17.0 | |
haxx | libcurl | 7.17.1 | |
haxx | libcurl | 7.18.0 | |
haxx | libcurl | 7.18.1 | |
haxx | libcurl | 7.18.2 | |
haxx | libcurl | 7.19.0 | |
haxx | libcurl | 7.19.1 | |
haxx | libcurl | 7.19.2 | |
haxx | libcurl | 7.19.3 | |
haxx | libcurl | 7.19.4 | |
haxx | libcurl | 7.19.5 | |
haxx | libcurl | 7.19.6 | |
haxx | libcurl | 7.19.7 | |
haxx | libcurl | 7.20.0 | |
haxx | libcurl | 7.20.1 | |
haxx | libcurl | 7.21.0 | |
haxx | libcurl | 7.21.1 | |
haxx | libcurl | 7.21.2 | |
haxx | libcurl | 7.21.3 | |
haxx | libcurl | 7.21.4 | |
haxx | libcurl | 7.21.5 | |
haxx | libcurl | 7.21.6 | |
haxx | libcurl | 7.21.7 | |
haxx | libcurl | 7.22.0 | |
haxx | libcurl | 7.23.0 | |
haxx | libcurl | 7.23.1 | |
haxx | libcurl | 7.24.0 | |
haxx | libcurl | 7.25.0 | |
haxx | libcurl | 7.26.0 | |
haxx | libcurl | 7.27.0 | |
haxx | libcurl | 7.28.0 | |
haxx | libcurl | 7.28.1 | |
haxx | libcurl | 7.29.0 | |
haxx | libcurl | 7.30.0 | |
canonical | ubuntu_linux | 10.04 | |
canonical | ubuntu_linux | 12.04 | |
canonical | ubuntu_linux | 12.10 | |
canonical | ubuntu_linux | 13.04 | |
opensuse | opensuse | 11.4 | |
redhat | enterprise_linux | 5 | |
redhat | enterprise_linux | 6.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:haxx:curl:7.7:*:*:*:*:*:*:*", "matchCriteriaId": "54C84348-C995-497A-970B-A476163CCCD3", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "CE53270B-8725-46C8-BECA-18D22586E6BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "C08511C8-C3A6-46AD-BB51-89D11C1D5EF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "51CCDA6F-57F9-4210-BEBB-6FDAAF8CDFEA", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.8:*:*:*:*:*:*:*", "matchCriteriaId": "EE4D74D0-C499-40DB-B6EB-4F235D8ABEEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "D00036A8-88E0-433A-BC21-E88712B829D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.9:*:*:*:*:*:*:*", "matchCriteriaId": "CAAE7B6C-903A-49B5-8CF2-F487C997F113", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "63B81C3D-2886-4E2B-9F85-DD074B3155B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "E610D9BA-4FDA-4E6D-96DC-168209C053FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "44BF0AF1-DFE0-4E37-B589-CFCE97B55876", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "FE536964-4741-459B-BBC8-61A7BAA8B71C", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "815B9BC6-7DE1-4149-AB7C-362188EE2871", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A7D07368-C6FE-4229-8262-46A974773F13", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "74980771-8060-4F5E-A6BD-D67956D9AB89", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "FE15C002-03E3-4503-A9EB-4C7CF190FFEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.10:*:*:*:*:*:*:*", "matchCriteriaId": "833263C9-E6A1-41F5-9164-7A4F3AACEB8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "1EA91B1A-835E-43AD-B9C2-992691B3A56E", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.10.2:*:*:*:*:*:*:*", "matchCriteriaId": "3F7D61B0-F591-47AE-918B-41BA0A2C21E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.10.3:*:*:*:*:*:*:*", "matchCriteriaId": "8DFF10A5-6779-46B3-B9BE-693654817334", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.10.4:*:*:*:*:*:*:*", "matchCriteriaId": "53638104-536B-482B-8853-1CE3967FB6F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.10.5:*:*:*:*:*:*:*", "matchCriteriaId": "FA92CDC6-7EB4-492A-91EE-B5F70F7D6C7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.10.6:*:*:*:*:*:*:*", "matchCriteriaId": "5D65CDC0-580B-42B3-97E8-69BE44CDB68C", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.10.7:*:*:*:*:*:*:*", "matchCriteriaId": "01001EEA-AB99-4041-8188-38CEBE9C3031", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.10.8:*:*:*:*:*:*:*", "matchCriteriaId": "31DB0DA3-88B7-43ED-8102-CEBC28524CE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "87596B6A-A7B3-4256-9982-45D3B6E3E018", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "0045855F-A707-415A-AC12-6981B68B08E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.11.2:*:*:*:*:*:*:*", "matchCriteriaId": "B49807DC-0BDA-41F6-BB76-7C62328D245F", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "0A78B6B8-9F4B-46AC-BB04-7EBADC690CBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "EFE80B46-33F0-4338-AF37-9E7E31FC5E83", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.12.2:*:*:*:*:*:*:*", "matchCriteriaId": "DD38D8C6-9EEE-4160-9353-773943A560B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.12.3:*:*:*:*:*:*:*", "matchCriteriaId": "FD33549E-EFFB-466F-8B47-BE036D454693", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.13.0:*:*:*:*:*:*:*", "matchCriteriaId": "16BB71C8-3564-4E69-A2C3-E9AB1F9EF20C", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.13.1:*:*:*:*:*:*:*", "matchCriteriaId": "4966AA12-15DB-44E5-84AF-9D7AF4A52F86", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.13.2:*:*:*:*:*:*:*", "matchCriteriaId": "827B6C8A-59C4-4714-9406-5C8EB5073AB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.14.0:*:*:*:*:*:*:*", "matchCriteriaId": "93A11305-E4FF-473B-9415-AF1F0E7A27D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.14.1:*:*:*:*:*:*:*", "matchCriteriaId": "8444095B-AF8F-42B5-BD4D-9CBE9238E42D", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.15.0:*:*:*:*:*:*:*", "matchCriteriaId": "C22F23AE-02AB-42F0-AA16-D2F8C94E5DE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B33DE520-BD2A-4499-B1F8-1439AE16AB57", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.15.2:*:*:*:*:*:*:*", "matchCriteriaId": "041FCB20-E74F-4550-AC48-EE4E5875E118", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.15.3:*:*:*:*:*:*:*", "matchCriteriaId": "D16DBA5E-582F-4648-932E-8A1EFB7FE3D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.15.4:*:*:*:*:*:*:*", "matchCriteriaId": "A25323F4-7C67-4097-AD53-A6B9E6D96BA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.15.5:*:*:*:*:*:*:*", "matchCriteriaId": "36919682-F59E-4EC0-886C-AE967F636753", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.16.0:*:*:*:*:*:*:*", "matchCriteriaId": "B45AF234-3651-4367-BFEF-8766F66FB138", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.16.1:*:*:*:*:*:*:*", "matchCriteriaId": "E46A9126-A02E-44CD-885D-0956E0C87C2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.16.2:*:*:*:*:*:*:*", "matchCriteriaId": "91E9C756-7FE3-4197-8C18-99CD1F49B0D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.16.3:*:*:*:*:*:*:*", "matchCriteriaId": "88806B7D-5EFE-4F91-B115-732882D2C126", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.16.4:*:*:*:*:*:*:*", "matchCriteriaId": "5BB9E8AB-B3EC-4743-B39B-7325EEB17233", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.17.0:*:*:*:*:*:*:*", "matchCriteriaId": "5030FBB0-C95B-4ADE-BFC2-CCA37AAD019B", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.17.1:*:*:*:*:*:*:*", "matchCriteriaId": "5513618A-6770-4292-95D1-68F55D8343CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.18.0:*:*:*:*:*:*:*", "matchCriteriaId": "7494C01F-E9EC-406E-879A-B2045865E282", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.18.1:*:*:*:*:*:*:*", "matchCriteriaId": "7DD9F894-4576-4ED1-9F55-4C27ECE7E058", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.18.2:*:*:*:*:*:*:*", "matchCriteriaId": "49AFACAC-BBAF-469B-BF05-0478E987120F", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.19.0:*:*:*:*:*:*:*", "matchCriteriaId": "6A136E86-0697-4915-BC49-F570C776EDE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.19.1:*:*:*:*:*:*:*", "matchCriteriaId": "ECB241AF-A01D-4FD6-B98A-F4C20F844C2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.19.2:*:*:*:*:*:*:*", "matchCriteriaId": "C5B61901-F7DF-4805-8EB7-CA1701CA81CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.19.3:*:*:*:*:*:*:*", "matchCriteriaId": "EB0CDEC9-224A-4668-B2E4-2145653E3F2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.19.4:*:*:*:*:*:*:*", "matchCriteriaId": "E92BE9CB-F001-47A0-94E0-48FC01A63FE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.19.5:*:*:*:*:*:*:*", "matchCriteriaId": "324E2A20-2F66-4E03-9A7F-A09E631E9033", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.19.6:*:*:*:*:*:*:*", "matchCriteriaId": "C8987B53-BD80-40B9-8429-21AD97208040", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.19.7:*:*:*:*:*:*:*", "matchCriteriaId": "490D1BDC-33B9-43BA-B6DA-42DEE577082A", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "B465BE7E-0B4D-4BC4-894B-3F51A201CE91", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.20.1:*:*:*:*:*:*:*", "matchCriteriaId": "CAA17087-3021-4961-B53C-CDCC872A31A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.21.0:*:*:*:*:*:*:*", "matchCriteriaId": "E5CA3936-4602-40E6-B75C-58D3F24268E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.21.1:*:*:*:*:*:*:*", "matchCriteriaId": "D87C110C-21DD-438A-90EF-BE516CF59F3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.21.2:*:*:*:*:*:*:*", "matchCriteriaId": "AD2D9E0E-2EED-4FB5-859C-05226FC48D7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.21.3:*:*:*:*:*:*:*", "matchCriteriaId": "7CA01E21-71CE-4B07-B5A6-D0D7AC493A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.21.4:*:*:*:*:*:*:*", "matchCriteriaId": "51239254-31CE-4BF7-8669-1525BA391362", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.21.5:*:*:*:*:*:*:*", "matchCriteriaId": "2E2BE20D-232D-4C86-81B0-C82CCC1CAA62", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.21.6:*:*:*:*:*:*:*", "matchCriteriaId": "D652FD7C-1521-4391-AAE1-0A4D6F4CE8F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.21.7:*:*:*:*:*:*:*", "matchCriteriaId": "DB861143-F809-45CF-95BE-E64F4BA1A0DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.22.0:*:*:*:*:*:*:*", "matchCriteriaId": "E3480F4A-0AE0-4428-9EDA-5A6B994909A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.23.0:*:*:*:*:*:*:*", "matchCriteriaId": "936BF59E-33A8-46BA-9FBD-8763812E2F10", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.23.1:*:*:*:*:*:*:*", "matchCriteriaId": "33168C81-6DAE-40D6-9693-68390CD71DA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.24.0:*:*:*:*:*:*:*", "matchCriteriaId": "424F9604-AA9A-4D45-A521-0BDEDB723659", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.25.0:*:*:*:*:*:*:*", "matchCriteriaId": "DC6EBCEB-E52C-4FF5-B15A-6960F58090EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.26.0:*:*:*:*:*:*:*", "matchCriteriaId": "D204E994-4591-403C-8EF3-D3B7BF4AA1A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.27.0:*:*:*:*:*:*:*", "matchCriteriaId": "EBF5418D-1162-4B1E-BC3D-06A3E084BEFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.28.0:*:*:*:*:*:*:*", "matchCriteriaId": "1CA65F31-3D54-4F66-A0A3-2BD993FF38F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.28.1:*:*:*:*:*:*:*", "matchCriteriaId": "41ACC9FE-62FF-424B-B4B8-B033FEAF7686", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.29.0:*:*:*:*:*:*:*", "matchCriteriaId": "F8BC39E9-5945-4DC8-ACA8-1C9918D9F279", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.30.0:*:*:*:*:*:*:*", "matchCriteriaId": "B9658447-FBB0-4DEA-8FEE-BD4D3D1BF7FF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:haxx:libcurl:7.7:*:*:*:*:*:*:*", "matchCriteriaId": "FB30E8CE-57AD-4225-8BC1-0C496A8A3D8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "F884BEE7-8AD7-4C39-B955-85578ADA7E5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "9C70D1DF-E117-409F-A4DE-8602AFCF9F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "E546224C-AA58-4025-B921-8D5ED1365FD2", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.8:*:*:*:*:*:*:*", "matchCriteriaId": "8360A6AE-9735-4019-9A24-A5045D528455", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "21EDD6A3-9D85-4E54-96BB-3A8055EB286C", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.9:*:*:*:*:*:*:*", "matchCriteriaId": "BE48C5C5-DF42-495D-A5A7-D189AE873CF6", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "CF611F14-AC9A-4D7E-BF95-2D00D880C40B", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "C378EDAB-0D0C-4A63-B230-0DC8EB74C5A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "A6D6717E-CB09-493D-AD86-7D5C7782CE12", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "6AF87C3C-1AF9-4015-A794-C160AD3128D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "4CDAFF2D-1F8C-45CD-BADC-8CBCEC27A8CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "F7EDAFA2-030E-438B-B83A-CF78A409D382", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "6CE2A761-2015-4E52-B284-02DC7ED03636", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "83BF3E1B-2F71-4142-A2A5-EA859D806094", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.10:*:*:*:*:*:*:*", "matchCriteriaId": "72EBCE6C-E0B9-4119-AD71-BF5CD3730D4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "5DBB2456-4B56-48CC-8A5C-55D5F9CC770B", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.10.2:*:*:*:*:*:*:*", "matchCriteriaId": "EE20AFEE-7287-4BCE-AE29-32E967FF8F9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.10.3:*:*:*:*:*:*:*", "matchCriteriaId": "1060ADF7-99EF-46B1-A999-106E86DC0562", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.10.4:*:*:*:*:*:*:*", "matchCriteriaId": "D66CFF54-F18B-4B82-A39D-99F1D53B6357", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.10.5:*:*:*:*:*:*:*", "matchCriteriaId": "9D7E1B7D-45B3-4803-B490-FDE40F018738", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.10.6:*:*:*:*:*:*:*", "matchCriteriaId": "2E1F9453-1FB6-4CA7-9285-A243E56667B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.10.7:*:*:*:*:*:*:*", "matchCriteriaId": "F79828BB-2412-46AD-BE3C-A51B48E191AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.10.8:*:*:*:*:*:*:*", "matchCriteriaId": "72D0F13F-D56F-4C1C-A3CF-2E4E704817CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "90A4F2E2-1B43-470E-8935-CB32F12A0124", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "797DF5C7-509E-48FD-BD04-C66E01748728", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.11.2:*:*:*:*:*:*:*", "matchCriteriaId": "47BD868A-CE3B-4E39-A588-C4EDA3265A71", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "4A2EE400-1C36-40F4-A9D1-9AB432F168BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "06E3CB14-FB16-4F4E-9AD9-A02DC727FF6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.12.2:*:*:*:*:*:*:*", "matchCriteriaId": "08DCC42C-C881-4AEA-9348-E8317C54D62B", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.12.3:*:*:*:*:*:*:*", "matchCriteriaId": "2BC4EF5A-C8CB-4F33-B4D1-E4192B179D26", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.13.0:*:*:*:*:*:*:*", "matchCriteriaId": "81CEF54A-9668-4031-926F-9B978DD5CDF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.13.1:*:*:*:*:*:*:*", "matchCriteriaId": "45068C90-8915-4D19-B36B-993980E28D08", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.13.2:*:*:*:*:*:*:*", "matchCriteriaId": "24543011-2458-47B5-984A-901E70084902", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.14.0:*:*:*:*:*:*:*", "matchCriteriaId": "FB482A9C-D577-4AEE-A08F-CAFA6586B51E", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.14.1:*:*:*:*:*:*:*", "matchCriteriaId": "65AF9B86-A555-4D5E-B24E-9EBF78BCD8CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.15.0:*:*:*:*:*:*:*", "matchCriteriaId": "60BBDF07-DB97-433E-B542-EFEBE45550DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.15.1:*:*:*:*:*:*:*", "matchCriteriaId": "CA8BE3F8-82ED-4DD7-991E-979E950C98B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.15.2:*:*:*:*:*:*:*", "matchCriteriaId": "738AA231-4694-46E8-B559-1594263A9987", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.15.3:*:*:*:*:*:*:*", "matchCriteriaId": "E9E1F171-B887-499A-BF4F-538EBF347811", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.15.4:*:*:*:*:*:*:*", "matchCriteriaId": "07AA276A-0EBA-4DC9-951C-8F8159FAC7A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.15.5:*:*:*:*:*:*:*", "matchCriteriaId": "8DEEF534-9AD2-4439-9D69-E91D062C4647", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.16.0:*:*:*:*:*:*:*", "matchCriteriaId": "63643BE1-C978-4CD2-8ED1-2B979DB0676E", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.16.1:*:*:*:*:*:*:*", "matchCriteriaId": "F6FA04A0-9258-4654-ABCF-F41340B1FA35", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.16.2:*:*:*:*:*:*:*", "matchCriteriaId": "DE829230-AFDB-4131-9C6A-D9D7A66C5B57", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.16.3:*:*:*:*:*:*:*", "matchCriteriaId": "B7E8BA30-8087-48D4-AE1B-48326FF826B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.16.4:*:*:*:*:*:*:*", "matchCriteriaId": "47970EFF-2F51-4875-A6BD-E30614E13278", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.17.0:*:*:*:*:*:*:*", "matchCriteriaId": "52C9B668-3204-41C5-A82E-262BDFA541DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*", "matchCriteriaId": "08C8EE1E-E186-42D6-8B12-05865C73F261", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*", "matchCriteriaId": "EEA3D88B-41B9-4D79-B47D-B3D6058C0C27", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.18.1:*:*:*:*:*:*:*", "matchCriteriaId": "C2C80901-D48E-4C2A-9BED-A40007A11C97", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*", "matchCriteriaId": "331A51E4-AA73-486F-9618-5A83965F2436", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.0:*:*:*:*:*:*:*", "matchCriteriaId": "EB32DF2C-9208-4853-ADEB-B00D764D7467", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.1:*:*:*:*:*:*:*", "matchCriteriaId": "E05636DC-7E38-4605-AAB8-81C0AE37520A", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.2:*:*:*:*:*:*:*", "matchCriteriaId": "624DF2F1-53FD-48D3-B93D-44E99C9C0C5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*", "matchCriteriaId": "F2171C7C-311A-4405-B95F-3A54966FA844", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.4:*:*:*:*:*:*:*", "matchCriteriaId": "5DE20A41-8B53-46FC-9002-69CC7495171F", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.5:*:*:*:*:*:*:*", "matchCriteriaId": "87ED9DA0-E880-4CBB-B1AC-5AEE8A004718", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.6:*:*:*:*:*:*:*", "matchCriteriaId": "5293C7F0-BF9F-4768-889A-876CE78903CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.7:*:*:*:*:*:*:*", "matchCriteriaId": "F3EB41B3-65F3-4B0E-8CCC-325B14AF605B", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "857B244C-2AFB-40C7-A893-7C6DE9871BCE", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.20.1:*:*:*:*:*:*:*", "matchCriteriaId": "B732CE55-820A-40E0-A885-71BBB6CF8C15", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.0:*:*:*:*:*:*:*", "matchCriteriaId": "0455A5F2-1515-4CD8-BA2F-74D28E91A661", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.1:*:*:*:*:*:*:*", "matchCriteriaId": "29034B3A-BE9D-4D68-8C56-4465C03C3693", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*", "matchCriteriaId": "6249538E-FBCB-4130-91FB-DA78D7BA45DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.3:*:*:*:*:*:*:*", "matchCriteriaId": "5E11B8A5-50A2-468F-BFB3-86DD9D28AC73", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.4:*:*:*:*:*:*:*", "matchCriteriaId": "9EAE25A0-3828-46F1-AB30-88732CBC9F38", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.5:*:*:*:*:*:*:*", "matchCriteriaId": "1533A85C-2160-445D-8787-E624AEDC5A0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.6:*:*:*:*:*:*:*", "matchCriteriaId": "D87B9393-7EA4-43DA-900C-7E840AE2D4C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.7:*:*:*:*:*:*:*", "matchCriteriaId": "7D1249E9-304F-4952-8DAB-8B79CE5E7D54", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*", "matchCriteriaId": "83FAF953-6A65-4FAB-BDB5-03B468CD1C9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*", "matchCriteriaId": "29F8FF1F-A639-4161-9366-62528AAF4C07", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.23.1:*:*:*:*:*:*:*", "matchCriteriaId": "812AB429-379A-4EDE-9664-5BC2989053F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.24.0:*:*:*:*:*:*:*", "matchCriteriaId": "13DD791F-C4BD-4456-955A-92E84082AA09", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.25.0:*:*:*:*:*:*:*", "matchCriteriaId": "4A17E442-45AA-4780-98B4-9BF764DCC1C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*", "matchCriteriaId": "F6AF544C-5F16-4434-B9FB-93B1B7318950", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*", "matchCriteriaId": "CBFD9ED9-2412-44AE-9C55-0ED03A121B23", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*", "matchCriteriaId": "67CCE31B-ABDA-4F32-BAF1-B1AD0664B3E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*", "matchCriteriaId": "9E66A332-ECD1-4452-B444-FB629022FDF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.29.0:*:*:*:*:*:*:*", "matchCriteriaId": "CDD3D599-35E9-4590-B5E0-3AF04D344695", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.30.0:*:*:*:*:*:*:*", "matchCriteriaId": "A3B6BFFB-7967-482C-9B49-4BD25C815299", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*", "matchCriteriaId": "7118F616-25CA-4E34-AA13-4D14BB62419F", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*", "matchCriteriaId": "F5D324C4-97C7-49D3-A809-9EAD4B690C69", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "matchCriteriaId": "E2076871-2E80-4605-A470-A41C1A8EC7EE", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*", "matchCriteriaId": "EFAA48D9-BEB4-4E49-AD50-325C262D46D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*", "matchCriteriaId": "DE554781-1EB9-446E-911F-6C11970C47F4", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*", "matchCriteriaId": "AA9B3CC0-DF1C-4A86-B2A3-A9D428A5A6E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in the curl_easy_unescape function in lib/escape.c in cURL and libcurl 7.7 through 7.30.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted string ending in a \"%\" (percent) character." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en memoria din\u00e1mica en la funci\u00f3n curl_easy_unescape en lib/escape.c en cURL y libcurl 7.7 a la 7.30.0, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda de aplicaci\u00f3n) o posiblemente la ejecuci\u00f3n de c\u00f3digo arbitrario a trav\u00e9s de una cadena manipulada que termina con el car\u00e1cter \"%\"." } ], "id": "CVE-2013-2174", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-07-31T13:20:25.267", "references": [ { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://curl.haxx.se/docs/adv_20130622.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-updates/2013-07/msg00013.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2013-0983.html" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2013/dsa-2713" }, { "source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/60737" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/USN-1894-1" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Patch" ], "url": "https://github.com/bagder/curl/commit/192c4f788d48f82c03e9cef40013f34370e90737" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://curl.haxx.se/docs/adv_20130622.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2013-07/msg00013.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2013-0983.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2013/dsa-2713" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/60737" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1894-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "https://github.com/bagder/curl/commit/192c4f788d48f82c03e9cef40013f34370e90737" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-08-19 17:15
Modified
2025-03-14 16:15
Severity ?
5.9 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
5.9 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
5.9 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Summary
The libcurl CURLOPT_SSL_VERIFYPEER option was disabled on a subset of requests made by Nest production devices which enabled a potential man-in-the-middle attack on requests to Google cloud services by any host the traffic was routed through.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:nest_mini_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BDFD7974-8108-4FBD-A70C-3EBE70EC8A4E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:google:nest_mini:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D380EB7-288F-420B-A971-CBDF91AEE8BF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:haxx:libcurl:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D43957B-3D81-4334-9C2C-819F8B322FC7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The libcurl CURLOPT_SSL_VERIFYPEER option was disabled on a subset of requests made by Nest production devices which enabled a potential man-in-the-middle attack on requests to Google cloud services by any host the traffic was routed through." }, { "lang": "es", "value": "La opci\u00f3n libcurl CURLOPT_SSL_VERIFYPEER se deshabilit\u00f3 en un subconjunto de solicitudes realizadas por dispositivos de producci\u00f3n Nest, lo que permiti\u00f3 un posible ataque de intermediario en solicitudes a los servicios en la nube de Google por parte de cualquier host por el que se enrutara el tr\u00e1fico." } ], "id": "CVE-2024-32928", "lastModified": "2025-03-14T16:15:31.157", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2024-08-19T17:15:07.557", "references": [ { "source": "dsap-vuln-management@google.com", "tags": [ "Vendor Advisory" ], "url": "https://support.google.com/product-documentation/answer/14771247?hl=en\u0026ref_topic=12974021\u0026sjid=9111851316942032590-NA#zippy=" } ], "sourceIdentifier": "dsap-vuln-management@google.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-295" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2020-12-14 20:15
Modified
2024-11-21 05:38
Severity ?
Summary
Due to use of a dangling pointer, libcurl 7.29.0 through 7.71.1 can use the wrong connection when sending data.
References
▶ | URL | Tags | |
---|---|---|---|
support@hackerone.com | https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf | Patch, Third Party Advisory | |
support@hackerone.com | https://curl.haxx.se/docs/CVE-2020-8231.html | Patch, Third Party Advisory | |
support@hackerone.com | https://hackerone.com/reports/948876 | Exploit, Issue Tracking, Patch, Third Party Advisory | |
support@hackerone.com | https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E | Mailing List, Third Party Advisory | |
support@hackerone.com | https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E | Mailing List, Third Party Advisory | |
support@hackerone.com | https://security.gentoo.org/glsa/202012-14 | Third Party Advisory | |
support@hackerone.com | https://www.debian.org/security/2021/dsa-4881 | Third Party Advisory | |
support@hackerone.com | https://www.oracle.com/security-alerts/cpuapr2022.html | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://curl.haxx.se/docs/CVE-2020-8231.html | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://hackerone.com/reports/948876 | Exploit, Issue Tracking, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/202012-14 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2021/dsa-4881 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/security-alerts/cpuapr2022.html | Patch, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
haxx | libcurl | * | |
siemens | sinec_infrastructure_network_services | * | |
debian | debian_linux | 10.0 | |
oracle | communications_cloud_native_core_policy | 1.14.0 | |
splunk | universal_forwarder | * | |
splunk | universal_forwarder | * | |
splunk | universal_forwarder | 9.1.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*", "matchCriteriaId": "E8E4BB46-E10C-4037-AD80-0B5FB694F1F1", "versionEndIncluding": "7.71.1", "versionStartIncluding": "7.29.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*", "matchCriteriaId": "B0F46497-4AB0-49A7-9453-CC26837BF253", "versionEndExcluding": "1.0.1.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.14.0:*:*:*:*:*:*:*", "matchCriteriaId": "4479F76A-4B67-41CC-98C7-C76B81050F8E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:*", "matchCriteriaId": "5722E753-75DE-4944-A11B-556CB299B57D", "versionEndExcluding": "8.2.12", "versionStartIncluding": "8.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:*", "matchCriteriaId": "DC0F9351-81A4-4FEA-B6B5-6E960A933D32", "versionEndExcluding": "9.0.6", "versionStartIncluding": "9.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:splunk:universal_forwarder:9.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "EED24E67-2957-4C1B-8FEA-E2D2FE7B97FC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Due to use of a dangling pointer, libcurl 7.29.0 through 7.71.1 can use the wrong connection when sending data." }, { "lang": "es", "value": "Debido al uso de un puntero colgante, libcurl versiones 7.29.0 hasta 7.71.1, puede usar la conexi\u00f3n err\u00f3nea cuando env\u00eda datos" } ], "id": "CVE-2020-8231", "lastModified": "2024-11-21T05:38:33.127", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-12-14T20:15:13.590", "references": [ { "source": "support@hackerone.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "source": "support@hackerone.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://curl.haxx.se/docs/CVE-2020-8231.html" }, { "source": "support@hackerone.com", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://hackerone.com/reports/948876" }, { "source": "support@hackerone.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "support@hackerone.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "support@hackerone.com", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202012-14" }, { "source": "support@hackerone.com", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4881" }, { "source": "support@hackerone.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://curl.haxx.se/docs/CVE-2020-8231.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://hackerone.com/reports/948876" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202012-14" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4881" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "sourceIdentifier": "support@hackerone.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "support@hackerone.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2016-10-07 14:59
Modified
2025-04-12 10:46
Severity ?
Summary
Multiple integer overflows in the (1) curl_escape, (2) curl_easy_escape, (3) curl_unescape, and (4) curl_easy_unescape functions in libcurl before 7.50.3 allow attackers to have unspecified impact via a string of length 0xffffffff, which triggers a heap-based buffer overflow.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html | ||
cve@mitre.org | http://www.securityfocus.com/bid/92975 | Broken Link | |
cve@mitre.org | http://www.securitytracker.com/id/1036813 | Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.538632 | Third Party Advisory | |
cve@mitre.org | https://access.redhat.com/errata/RHSA-2017:2016 | ||
cve@mitre.org | https://access.redhat.com/errata/RHSA-2018:2486 | ||
cve@mitre.org | https://access.redhat.com/errata/RHSA-2018:3558 | ||
cve@mitre.org | https://curl.haxx.se/docs/adv_20160914.html | Vendor Advisory | |
cve@mitre.org | https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html | ||
cve@mitre.org | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B3IU2FRXQNU6UJIQT4NGLWWTP2GJQXO7/ | ||
cve@mitre.org | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTH54DFOS4TSYPG5XKJDGAG4XPAR4T7M/ | ||
cve@mitre.org | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZMRWVISG7VUCYRMF23A2UHMYD72VQWAK/ | ||
cve@mitre.org | https://security.gentoo.org/glsa/201701-47 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/92975 | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1036813 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.538632 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2017:2016 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:2486 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:3558 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://curl.haxx.se/docs/adv_20160914.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B3IU2FRXQNU6UJIQT4NGLWWTP2GJQXO7/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTH54DFOS4TSYPG5XKJDGAG4XPAR4T7M/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZMRWVISG7VUCYRMF23A2UHMYD72VQWAK/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/201701-47 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
fedoraproject | fedora | 23 | |
fedoraproject | fedora | 24 | |
fedoraproject | fedora | 25 | |
haxx | libcurl | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "matchCriteriaId": "E79AB8DD-C907-4038-A931-1A5A4CFB6A5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*", "matchCriteriaId": "C729D5D1-ED95-443A-9F53-5D7C2FD9B80C", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:25:*:*:*:*:*:*:*", "matchCriteriaId": "772E9557-A371-4664-AE2D-4135AAEB89AA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*", "matchCriteriaId": "D3C80776-5504-4B04-A5BE-3446430B5F43", "versionEndIncluding": "7.50.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple integer overflows in the (1) curl_escape, (2) curl_easy_escape, (3) curl_unescape, and (4) curl_easy_unescape functions in libcurl before 7.50.3 allow attackers to have unspecified impact via a string of length 0xffffffff, which triggers a heap-based buffer overflow." }, { "lang": "es", "value": "M\u00faltiples desbordamientos de entero en las funciones (1) curl_escape, (2) curl_easy_escape, (3) curl_unescape y (4) curl_easy_unescape en libcurl en versiones anteriores a 7.50.3 permiten a atacantes tener impacto no especificado a trav\u00e9s de una cadena de longitud 0xffffffff, lo que desencadena un desbordamiento de b\u00fafer basado en memoria din\u00e1mica." } ], "id": "CVE-2016-7167", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-10-07T14:59:08.100", "references": [ { "source": "cve@mitre.org", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.securityfocus.com/bid/92975" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1036813" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.538632" }, { "source": "cve@mitre.org", "url": "https://access.redhat.com/errata/RHSA-2017:2016" }, { "source": "cve@mitre.org", "url": "https://access.redhat.com/errata/RHSA-2018:2486" }, { "source": "cve@mitre.org", "url": "https://access.redhat.com/errata/RHSA-2018:3558" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://curl.haxx.se/docs/adv_20160914.html" }, { "source": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B3IU2FRXQNU6UJIQT4NGLWWTP2GJQXO7/" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTH54DFOS4TSYPG5XKJDGAG4XPAR4T7M/" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZMRWVISG7VUCYRMF23A2UHMYD72VQWAK/" }, { "source": "cve@mitre.org", "url": "https://security.gentoo.org/glsa/201701-47" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.securityfocus.com/bid/92975" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1036813" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.538632" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2017:2016" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2018:2486" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2018:3558" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://curl.haxx.se/docs/adv_20160914.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B3IU2FRXQNU6UJIQT4NGLWWTP2GJQXO7/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTH54DFOS4TSYPG5XKJDGAG4XPAR4T7M/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZMRWVISG7VUCYRMF23A2UHMYD72VQWAK/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201701-47" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-190" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-09-05 19:29
Modified
2024-11-21 03:49
Severity ?
7.5 (High) - CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
curl before version 7.61.1 is vulnerable to a buffer overrun in the NTLM authentication code. The internal function Curl_ntlm_core_mk_nt_hash multiplies the length of the password by two (SUM) to figure out how large temporary storage area to allocate from the heap. The length value is then subsequently used to iterate over the password and generate output into the allocated storage buffer. On systems with a 32 bit size_t, the math to calculate SUM triggers an integer overflow when the password length exceeds 2GB (2^31 bytes). This integer overflow usually causes a very small buffer to actually get allocated instead of the intended very huge one, making the use of that buffer end up in a heap buffer overflow. (This bug is almost identical to CVE-2017-8816.)
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://www.securitytracker.com/id/1041605 | Third Party Advisory, VDB Entry | |
secalert@redhat.com | https://access.redhat.com/errata/RHSA-2018:3558 | Third Party Advisory | |
secalert@redhat.com | https://access.redhat.com/errata/RHSA-2019:1880 | ||
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14618 | Issue Tracking | |
secalert@redhat.com | https://cert-portal.siemens.com/productcert/pdf/ssa-436177.pdf | ||
secalert@redhat.com | https://curl.haxx.se/docs/CVE-2018-14618.html | Vendor Advisory | |
secalert@redhat.com | https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0014 | Third Party Advisory | |
secalert@redhat.com | https://security.gentoo.org/glsa/201903-03 | Third Party Advisory | |
secalert@redhat.com | https://usn.ubuntu.com/3765-1/ | Third Party Advisory | |
secalert@redhat.com | https://usn.ubuntu.com/3765-2/ | Third Party Advisory | |
secalert@redhat.com | https://www.debian.org/security/2018/dsa-4286 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1041605 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:3558 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2019:1880 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14618 | Issue Tracking | |
af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-436177.pdf | ||
af854a3a-2127-422b-91ae-364da2661108 | https://curl.haxx.se/docs/CVE-2018-14618.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0014 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/201903-03 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3765-1/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3765-2/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2018/dsa-4286 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
haxx | libcurl | * | |
canonical | ubuntu_linux | 12.04 | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 16.04 | |
canonical | ubuntu_linux | 18.04 | |
debian | debian_linux | 9.0 | |
redhat | enterprise_linux | 6.0 | |
redhat | enterprise_linux | 7.0 | |
redhat | enterprise_linux | 7.4 | |
redhat | enterprise_linux | 7.5 | |
redhat | enterprise_linux | 7.6 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*", "matchCriteriaId": "52ABFC88-7FDA-4850-BAAB-EAEBAA132B1A", "versionEndExcluding": "7.61.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "matchCriteriaId": "8D305F7A-D159-4716-AB26-5E38BB5CD991", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:7.4:*:*:*:*:*:*:*", "matchCriteriaId": "041F9200-4C01-4187-AE34-240E8277B54D", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:7.5:*:*:*:*:*:*:*", "matchCriteriaId": "4EB48767-F095-444F-9E05-D9AC345AB803", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:7.6:*:*:*:*:*:*:*", "matchCriteriaId": "5F6FA12B-504C-4DBF-A32E-0548557AA2ED", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "curl before version 7.61.1 is vulnerable to a buffer overrun in the NTLM authentication code. The internal function Curl_ntlm_core_mk_nt_hash multiplies the length of the password by two (SUM) to figure out how large temporary storage area to allocate from the heap. The length value is then subsequently used to iterate over the password and generate output into the allocated storage buffer. On systems with a 32 bit size_t, the math to calculate SUM triggers an integer overflow when the password length exceeds 2GB (2^31 bytes). This integer overflow usually causes a very small buffer to actually get allocated instead of the intended very huge one, making the use of that buffer end up in a heap buffer overflow. (This bug is almost identical to CVE-2017-8816.)" }, { "lang": "es", "value": "curl en versiones anteriores a la 7.61.1 es vulnerable a un desbordamiento de b\u00fafer en el c\u00f3digo de autenticaci\u00f3n NTLM. La funci\u00f3n interna Curl_ntlm_core_mk_nt_hash multiplica la longitud de la contrase\u00f1a por dos (SUM) para adivinar qu\u00e9 tama\u00f1o debe tener la zona de almacenamiento temporal que se va a asignar desde la memoria din\u00e1mica (heap). El valor de longitud se emplea a continuaci\u00f3n para iterar sobre la contrase\u00f1a y generar una salida en el b\u00fafer de almacenamiento asignado. En sistemas con un size_t de 32 bits, la matem\u00e1tica para calcular SUM desencadena un desbordamiento de enteros cuando la contrase\u00f1a excede los 2 GB (2^31 bytes). Este desbordamiento de enteros suele provocar que un b\u00fafer muy peque\u00f1o se asigne en lugar del planeado (uno muy grande), por lo que su uso termina con un desbordamiento de b\u00fafer basado en memoria din\u00e1mica (heap). (Este error es casi id\u00e9ntico a CVE-2017-8816)." } ], "id": "CVE-2018-14618", "lastModified": "2024-11-21T03:49:26.003", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.6, "impactScore": 5.9, "source": "secalert@redhat.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-09-05T19:29:00.420", "references": [ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1041605" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:3558" }, { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2019:1880" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14618" }, { "source": "secalert@redhat.com", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-436177.pdf" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://curl.haxx.se/docs/CVE-2018-14618.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0014" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201903-03" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3765-1/" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3765-2/" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4286" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1041605" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:3558" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2019:1880" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14618" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-436177.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://curl.haxx.se/docs/CVE-2018-14618.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0014" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201903-03" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3765-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3765-2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4286" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-122" }, { "lang": "en", "value": "CWE-131" } ], "source": "secalert@redhat.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-190" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-11-29 18:29
Modified
2025-04-20 01:37
Severity ?
Summary
The NTLM authentication feature in curl and libcurl before 7.57.0 on 32-bit platforms allows attackers to cause a denial of service (integer overflow and resultant buffer overflow, and application crash) or possibly have unspecified other impact via vectors involving long user and password fields.
References
▶ | URL | Tags | |
---|---|---|---|
security@debian.org | http://security.cucumberlinux.com/security/details.php?id=161 | Third Party Advisory | |
security@debian.org | http://www.securityfocus.com/bid/101998 | Third Party Advisory, VDB Entry | |
security@debian.org | http://www.securitytracker.com/id/1039896 | Third Party Advisory, VDB Entry | |
security@debian.org | http://www.securitytracker.com/id/1040608 | ||
security@debian.org | https://access.redhat.com/errata/RHSA-2018:3558 | ||
security@debian.org | https://curl.haxx.se/docs/adv_2017-12e7.html | Mitigation, Vendor Advisory | |
security@debian.org | https://security.gentoo.org/glsa/201712-04 | Third Party Advisory | |
security@debian.org | https://www.debian.org/security/2017/dsa-4051 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://security.cucumberlinux.com/security/details.php?id=161 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/101998 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1039896 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1040608 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:3558 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://curl.haxx.se/docs/adv_2017-12e7.html | Mitigation, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/201712-04 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2017/dsa-4051 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
haxx | curl | * | |
haxx | libcurl | * | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*", "matchCriteriaId": "A0B36AFF-B48F-4C92-9E65-5BEE2A988057", "versionEndIncluding": "7.56.1", "versionStartExcluding": "7.36.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*", "matchCriteriaId": "116D6861-406B-451F-8CE1-43BFBB818783", "versionEndIncluding": "7.56.1", "versionStartIncluding": "7.36.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The NTLM authentication feature in curl and libcurl before 7.57.0 on 32-bit platforms allows attackers to cause a denial of service (integer overflow and resultant buffer overflow, and application crash) or possibly have unspecified other impact via vectors involving long user and password fields." }, { "lang": "es", "value": "La caracter\u00edstica de autenticaci\u00f3n NTLM en curl y libcurl en versiones anteriores a la 7.57.0 en plataformas de 32-bits permite que los atacantes provoquen una denegaci\u00f3n de servicio (desbordamiento de enteros y desbordamiento de b\u00fafer resultante, y cierre inesperado de la aplicaci\u00f3n) o que, posiblemente, causen otro tipo de impacto sin especificar mediante vectores relacionados con campos user y password largos." } ], "id": "CVE-2017-8816", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-11-29T18:29:00.300", "references": [ { "source": "security@debian.org", "tags": [ "Third Party Advisory" ], "url": "http://security.cucumberlinux.com/security/details.php?id=161" }, { "source": "security@debian.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/101998" }, { "source": "security@debian.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039896" }, { "source": "security@debian.org", "url": "http://www.securitytracker.com/id/1040608" }, { "source": "security@debian.org", "url": "https://access.redhat.com/errata/RHSA-2018:3558" }, { "source": "security@debian.org", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://curl.haxx.se/docs/adv_2017-12e7.html" }, { "source": "security@debian.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201712-04" }, { "source": "security@debian.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2017/dsa-4051" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://security.cucumberlinux.com/security/details.php?id=161" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/101998" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039896" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1040608" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2018:3558" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://curl.haxx.se/docs/adv_2017-12e7.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201712-04" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2017/dsa-4051" } ], "sourceIdentifier": "security@debian.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-190" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-11-18 15:59
Modified
2025-04-12 10:46
Severity ?
Summary
cURL and libcurl before 7.38.0 allow remote attackers to bypass the Same Origin Policy and set cookies for arbitrary sites by setting a cookie for a top-level domain.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://curl.haxx.se/docs/adv_20140910B.html | Patch, Vendor Advisory | |
secalert@redhat.com | http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743 | ||
secalert@redhat.com | http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html | ||
secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00024.html | ||
secalert@redhat.com | http://www.debian.org/security/2014/dsa-3022 | Vendor Advisory | |
secalert@redhat.com | http://www.openwall.com/lists/oss-security/2022/05/11/2 | ||
secalert@redhat.com | http://www.securityfocus.com/bid/69742 | ||
secalert@redhat.com | https://support.apple.com/kb/HT205031 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://curl.haxx.se/docs/adv_20140910B.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00024.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2014/dsa-3022 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2022/05/11/2 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/69742 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT205031 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
haxx | curl | * | |
haxx | curl | 7.31.0 | |
haxx | curl | 7.32.0 | |
haxx | curl | 7.33.0 | |
haxx | curl | 7.34.0 | |
haxx | curl | 7.35.0 | |
haxx | curl | 7.36.0 | |
haxx | curl | 7.37.0 | |
haxx | libcurl | * | |
haxx | libcurl | 7.31.0 | |
haxx | libcurl | 7.32.0 | |
haxx | libcurl | 7.33.0 | |
haxx | libcurl | 7.34.0 | |
haxx | libcurl | 7.35.0 | |
haxx | libcurl | 7.36.0 | |
haxx | libcurl | 7.37.0 | |
apple | mac_os_x | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*", "matchCriteriaId": "B72E7AFD-F700-4EE7-AC64-238AC573CDBA", "versionEndIncluding": "7.37.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.31.0:*:*:*:*:*:*:*", "matchCriteriaId": "5ECABFCB-0D02-4B5B-BB35-C6B3C0896348", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.32.0:*:*:*:*:*:*:*", "matchCriteriaId": "5A5176F0-E62F-46FF-B536-DC0680696773", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.33.0:*:*:*:*:*:*:*", "matchCriteriaId": "506A3761-3D24-43DB-88D8-4EB5B9E8BA5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.34.0:*:*:*:*:*:*:*", "matchCriteriaId": "0B6EF8B0-0E86-449C-A500-ACD902A78C7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.35.0:*:*:*:*:*:*:*", "matchCriteriaId": "4D558CC2-0146-4887-834E-19FCB1D512A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.36.0:*:*:*:*:*:*:*", "matchCriteriaId": "6931764D-16AB-4546-9CE3-5B4E03BC984A", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.37.0:*:*:*:*:*:*:*", "matchCriteriaId": "6FC1313E-8DCB-4B29-A9BC-A27C8CB360E9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*", "matchCriteriaId": "F0181855-D18C-49D9-8BC5-2EC16689B7EF", "versionEndIncluding": "7.37.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*", "matchCriteriaId": "1791BF6D-2C96-4A6E-90D4-2906A73601F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*", "matchCriteriaId": "260DD751-4145-4B75-B892-5FC932C6A305", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*", "matchCriteriaId": "EFF4AD0D-2EC5-4CE8-B6B3-2EC8ED2FF118", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*", "matchCriteriaId": "3EB1CB85-0A9B-4816-B471-278774EE6D4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*", "matchCriteriaId": "3831AB03-4E7E-476D-9623-58AADC188DFE", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*", "matchCriteriaId": "ABACE305-2F0C-4B59-BC5C-6DF162B450E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*", "matchCriteriaId": "6FAC1B55-F492-484E-B837-E7745682DE0A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "7883E465-932D-4C11-AA54-97E44181F906", "versionEndIncluding": "10.10.4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "cURL and libcurl before 7.38.0 allow remote attackers to bypass the Same Origin Policy and set cookies for arbitrary sites by setting a cookie for a top-level domain." }, { "lang": "es", "value": "cURL y libcurl anteriores a 7.38.0 permite a atacantes remotos evadir Same Origin Policy y configurar cookies para sitios arbitrarios mediante la configuraci\u00f3n de una cookie de un dominio de nivel superior." } ], "id": "CVE-2014-3620", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-11-18T15:59:01.390", "references": [ { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://curl.haxx.se/docs/adv_20140910B.html" }, { "source": "secalert@redhat.com", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10743" }, { "source": "secalert@redhat.com", "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00024.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://www.debian.org/security/2014/dsa-3022" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2022/05/11/2" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/69742" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://support.apple.com/kb/HT205031" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://curl.haxx.se/docs/adv_20140910B.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10743" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00024.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.debian.org/security/2014/dsa-3022" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2022/05/11/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/69742" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.apple.com/kb/HT205031" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-310" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2016-08-10 14:59
Modified
2025-04-12 10:46
Severity ?
Summary
curl and libcurl before 7.50.1 do not check the client certificate when choosing the TLS connection to reuse, which might allow remote attackers to hijack the authentication of the connection by leveraging a previously created connection with a different client certificate.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://lists.opensuse.org/opensuse-updates/2016-09/msg00011.html | ||
secalert@redhat.com | http://lists.opensuse.org/opensuse-updates/2016-09/msg00094.html | Third Party Advisory | |
secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2016-2575.html | ||
secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2016-2957.html | ||
secalert@redhat.com | http://www.debian.org/security/2016/dsa-3638 | Third Party Advisory | |
secalert@redhat.com | http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html | ||
secalert@redhat.com | http://www.securityfocus.com/bid/92309 | ||
secalert@redhat.com | http://www.securitytracker.com/id/1036537 | ||
secalert@redhat.com | http://www.securitytracker.com/id/1036739 | ||
secalert@redhat.com | http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.563059 | ||
secalert@redhat.com | http://www.ubuntu.com/usn/USN-3048-1 | ||
secalert@redhat.com | https://access.redhat.com/errata/RHSA-2018:3558 | ||
secalert@redhat.com | https://curl.haxx.se/docs/adv_20160803B.html | Mitigation, Patch, Vendor Advisory | |
secalert@redhat.com | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GLPXQQKURBQFM4XM6645VRPTOE2AWG33/ | ||
secalert@redhat.com | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K3GQH4V3XAQ5Z53AMQRDEC3C3UHTW7QR/ | ||
secalert@redhat.com | https://security.gentoo.org/glsa/201701-47 | ||
secalert@redhat.com | https://source.android.com/security/bulletin/2016-12-01.html | ||
secalert@redhat.com | https://www.tenable.com/security/tns-2016-18 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-updates/2016-09/msg00011.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-updates/2016-09/msg00094.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2016-2575.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2016-2957.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2016/dsa-3638 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/92309 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1036537 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1036739 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.563059 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-3048-1 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:3558 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://curl.haxx.se/docs/adv_20160803B.html | Mitigation, Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GLPXQQKURBQFM4XM6645VRPTOE2AWG33/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K3GQH4V3XAQ5Z53AMQRDEC3C3UHTW7QR/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/201701-47 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://source.android.com/security/bulletin/2016-12-01.html | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.tenable.com/security/tns-2016-18 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*", "matchCriteriaId": "D7D7843C-D4F4-4C0A-A919-9000E00637B6", "versionEndIncluding": "7.50.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "matchCriteriaId": "4863BE36-D16A-4D75-90D9-FD76DB5B48B7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "curl and libcurl before 7.50.1 do not check the client certificate when choosing the TLS connection to reuse, which might allow remote attackers to hijack the authentication of the connection by leveraging a previously created connection with a different client certificate." }, { "lang": "es", "value": "curl y libcurl en versiones anteriores a 7.50.1 no verifica el certificado de cliente cuando se est\u00e1 escogiendo la conexi\u00f3n TLS para reutilizar, lo que podr\u00eda permitir a atacantes remotos secuestrar la autenticaci\u00f3n de la conexi\u00f3n aprovechando una conexi\u00f3n previamente creada con un certificado de cliente diferente." } ], "id": "CVE-2016-5420", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-08-10T14:59:05.080", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-updates/2016-09/msg00011.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-09/msg00094.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2016-2575.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2016-2957.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2016/dsa-3638" }, { "source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/92309" }, { "source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id/1036537" }, { "source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id/1036739" }, { "source": "secalert@redhat.com", "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.563059" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/USN-3048-1" }, { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2018:3558" }, { "source": "secalert@redhat.com", "tags": [ "Mitigation", "Patch", "Vendor Advisory" ], "url": "https://curl.haxx.se/docs/adv_20160803B.html" }, { "source": "secalert@redhat.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GLPXQQKURBQFM4XM6645VRPTOE2AWG33/" }, { "source": "secalert@redhat.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K3GQH4V3XAQ5Z53AMQRDEC3C3UHTW7QR/" }, { "source": "secalert@redhat.com", "url": "https://security.gentoo.org/glsa/201701-47" }, { "source": "secalert@redhat.com", "url": "https://source.android.com/security/bulletin/2016-12-01.html" }, { "source": "secalert@redhat.com", "url": "https://www.tenable.com/security/tns-2016-18" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2016-09/msg00011.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-09/msg00094.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2016-2575.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2016-2957.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2016/dsa-3638" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/92309" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1036537" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1036739" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.563059" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-3048-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2018:3558" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Patch", "Vendor Advisory" ], "url": "https://curl.haxx.se/docs/adv_20160803B.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GLPXQQKURBQFM4XM6645VRPTOE2AWG33/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K3GQH4V3XAQ5Z53AMQRDEC3C3UHTW7QR/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201701-47" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://source.android.com/security/bulletin/2016-12-01.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.tenable.com/security/tns-2016-18" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-285" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-03-30 20:15
Modified
2025-06-09 15:15
Severity ?
5.9 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
5.9 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
5.9 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Summary
An authentication bypass vulnerability exists in libcurl <8.0.0 in the FTP connection reuse feature that can result in wrong credentials being used during subsequent transfers. Previously created connections are kept in a connection pool for reuse if they match the current setup. However, certain FTP settings such as CURLOPT_FTP_ACCOUNT, CURLOPT_FTP_ALTERNATIVE_TO_USER, CURLOPT_FTP_SSL_CCC, and CURLOPT_USE_SSL were not included in the configuration match checks, causing them to match too easily. This could lead to libcurl using the wrong credentials when performing a transfer, potentially allowing unauthorized access to sensitive information.
References
▶ | URL | Tags | |
---|---|---|---|
support@hackerone.com | https://hackerone.com/reports/1892780 | Exploit, Third Party Advisory | |
support@hackerone.com | https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html | Mailing List, Third Party Advisory | |
support@hackerone.com | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/ | Mailing List, Third Party Advisory | |
support@hackerone.com | https://security.gentoo.org/glsa/202310-12 | Third Party Advisory | |
support@hackerone.com | https://security.netapp.com/advisory/ntap-20230420-0010/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://hackerone.com/reports/1892780 | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/ | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/202310-12 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20230420-0010/ | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
haxx | libcurl | * | |
fedoraproject | fedora | 36 | |
debian | debian_linux | 10.0 | |
netapp | active_iq_unified_manager | - | |
netapp | ontap_9 | - | |
netapp | h300s_firmware | - | |
netapp | h300s | - | |
netapp | h500s_firmware | - | |
netapp | h500s | - | |
netapp | h700s_firmware | - | |
netapp | h700s | - | |
netapp | h410s_firmware | - | |
netapp | h410s | - | |
splunk | universal_forwarder | * | |
splunk | universal_forwarder | * | |
splunk | universal_forwarder | 9.1.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*", "matchCriteriaId": "9C599258-A578-454A-BB51-AC2B5C4BE0A8", "versionEndIncluding": "7.88.1", "versionStartIncluding": "7.13.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", "matchCriteriaId": "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:ontap_9:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD886814-B4A0-4764-9F08-2060601D8E89", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6770B6C3-732E-4E22-BF1C-2D2FD610061C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F9C8C20-42EB-4AB5-BD97-212DEB070C43", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FFF7106-ED78-49BA-9EC5-B889E3685D53", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*", "matchCriteriaId": "E63D8B0F-006E-4801-BF9D-1C001BBFB4F9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "56409CEC-5A1E-4450-AA42-641E459CC2AF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*", "matchCriteriaId": "B06F4839-D16A-4A61-9BB5-55B13F41E47F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0B4AD8A-F172-4558-AEC6-FF424BA2D912", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*", "matchCriteriaId": "8497A4C9-8474-4A62-8331-3FE862ED4098", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:*", "matchCriteriaId": "5722E753-75DE-4944-A11B-556CB299B57D", "versionEndExcluding": "8.2.12", "versionStartIncluding": "8.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:*", "matchCriteriaId": "DC0F9351-81A4-4FEA-B6B5-6E960A933D32", "versionEndExcluding": "9.0.6", "versionStartIncluding": "9.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:splunk:universal_forwarder:9.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "EED24E67-2957-4C1B-8FEA-E2D2FE7B97FC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An authentication bypass vulnerability exists in libcurl \u003c8.0.0 in the FTP connection reuse feature that can result in wrong credentials being used during subsequent transfers. Previously created connections are kept in a connection pool for reuse if they match the current setup. However, certain FTP settings such as CURLOPT_FTP_ACCOUNT, CURLOPT_FTP_ALTERNATIVE_TO_USER, CURLOPT_FTP_SSL_CCC, and CURLOPT_USE_SSL were not included in the configuration match checks, causing them to match too easily. This could lead to libcurl using the wrong credentials when performing a transfer, potentially allowing unauthorized access to sensitive information." } ], "id": "CVE-2023-27535", "lastModified": "2025-06-09T15:15:28.903", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2023-03-30T20:15:07.483", "references": [ { "source": "support@hackerone.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://hackerone.com/reports/1892780" }, { "source": "support@hackerone.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html" }, { "source": "support@hackerone.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/" }, { "source": "support@hackerone.com", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202310-12" }, { "source": "support@hackerone.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20230420-0010/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://hackerone.com/reports/1892780" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202310-12" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20230420-0010/" } ], "sourceIdentifier": "support@hackerone.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-305" } ], "source": "support@hackerone.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-11-29 18:29
Modified
2025-04-20 01:37
Severity ?
Summary
curl and libcurl before 7.57.0 on 32-bit platforms allow attackers to cause a denial of service (out-of-bounds access and application crash) or possibly have unspecified other impact because too little memory is allocated for interfacing to an SSL library.
References
▶ | URL | Tags | |
---|---|---|---|
security@debian.org | http://security.cucumberlinux.com/security/details.php?id=163 | Third Party Advisory | |
security@debian.org | http://www.securityfocus.com/bid/102014 | Third Party Advisory, VDB Entry | |
security@debian.org | http://www.securitytracker.com/id/1039898 | Third Party Advisory, VDB Entry | |
security@debian.org | https://curl.haxx.se/docs/adv_2017-af0a.html | Patch, Vendor Advisory | |
security@debian.org | https://security.gentoo.org/glsa/201712-04 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://security.cucumberlinux.com/security/details.php?id=163 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/102014 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1039898 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://curl.haxx.se/docs/adv_2017-af0a.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/201712-04 | Third Party Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:haxx:curl:7.56.0:*:*:*:*:*:*:*", "matchCriteriaId": "05A7C2E4-1DE8-40DE-AB2B-930E7435D005", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.56.1:*:*:*:*:*:*:*", "matchCriteriaId": "7F2AD970-AD25-4711-8D3C-B42F7616A36B", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.56.0:*:*:*:*:*:*:*", "matchCriteriaId": "DD56C515-5B37-4408-A909-ED45E6BAD643", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.56.1:*:*:*:*:*:*:*", "matchCriteriaId": "8C3467CA-68E0-4604-A107-586ECC27497F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "curl and libcurl before 7.57.0 on 32-bit platforms allow attackers to cause a denial of service (out-of-bounds access and application crash) or possibly have unspecified other impact because too little memory is allocated for interfacing to an SSL library." }, { "lang": "es", "value": "curl y libcurl en versiones anteriores a la 7.57.0 en plataformas de 32 bits permiten que los atacantes provoquen una denegaci\u00f3n de servicio (acceso fuera de l\u00edmites y cierre inesperado de la aplicaci\u00f3n) o, posiblemente, provoquen otro impacto porque se asigna demasiado poca memoria para interconectarse con una librer\u00eda SSL." } ], "id": "CVE-2017-8818", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-11-29T18:29:00.380", "references": [ { "source": "security@debian.org", "tags": [ "Third Party Advisory" ], "url": "http://security.cucumberlinux.com/security/details.php?id=163" }, { "source": "security@debian.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/102014" }, { "source": "security@debian.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039898" }, { "source": "security@debian.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://curl.haxx.se/docs/adv_2017-af0a.html" }, { "source": "security@debian.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201712-04" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://security.cucumberlinux.com/security/details.php?id=163" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/102014" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039898" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://curl.haxx.se/docs/adv_2017-af0a.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201712-04" } ], "sourceIdentifier": "security@debian.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-07-16 13:29
Modified
2024-11-21 03:31
Severity ?
4.8 (Medium) - CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
7.5 (High) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
7.5 (High) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Summary
In curl and libcurl 7.52.0 to and including 7.53.1, libcurl would attempt to resume a TLS session even if the client certificate had changed. That is unacceptable since a server by specification is allowed to skip the client certificate check on resume, and may instead use the old identity which was established by the previous certificate (or no certificate). libcurl supports by default the use of TLS session id/ticket to resume previous TLS sessions to speed up subsequent TLS handshakes. They are used when for any reason an existing TLS connection couldn't be kept alive to make the next handshake faster. This flaw is a regression and identical to CVE-2016-5419 reported on August 3rd 2016, but affecting a different version range.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://www.securityfocus.com/bid/97962 | Third Party Advisory, VDB Entry | |
secalert@redhat.com | http://www.securitytracker.com/id/1038341 | Third Party Advisory, VDB Entry | |
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7468 | Issue Tracking, Third Party Advisory | |
secalert@redhat.com | https://curl.haxx.se/docs/adv_20170419.html | Vendor Advisory | |
secalert@redhat.com | https://security.gentoo.org/glsa/201709-14 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/97962 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1038341 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7468 | Issue Tracking, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://curl.haxx.se/docs/adv_20170419.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/201709-14 | Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*", "matchCriteriaId": "3EDCC18C-69F4-4185-A846-513424A4E8A7", "versionEndIncluding": "7.53.1", "versionStartIncluding": "7.52.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In curl and libcurl 7.52.0 to and including 7.53.1, libcurl would attempt to resume a TLS session even if the client certificate had changed. That is unacceptable since a server by specification is allowed to skip the client certificate check on resume, and may instead use the old identity which was established by the previous certificate (or no certificate). libcurl supports by default the use of TLS session id/ticket to resume previous TLS sessions to speed up subsequent TLS handshakes. They are used when for any reason an existing TLS connection couldn\u0027t be kept alive to make the next handshake faster. This flaw is a regression and identical to CVE-2016-5419 reported on August 3rd 2016, but affecting a different version range." }, { "lang": "es", "value": "En curl y libcurl 7.52.0 hasta e incluyendo la versi\u00f3n 7.53.1, libcurl intenta retomar una sesi\u00f3n TLS aunque el certificado del cliente haya cambiado. Esto es inaceptable, ya que un servidor por sus especificaciones puede saltarse la comprobaci\u00f3n de certificado de cliente al retomar su operativa para emplear en su lugar la identidad antigua que fue establecida por el anterior certificado (o no certificado). Por defecto, libcurl soporta el uso de un ID/ticket TLS para retomar sesiones TLS anteriores para acelerar los handshakes TLS subsecuentes. Se emplean cuando, por alg\u00fan motivo, una conexi\u00f3n TLS no pudo mantenerse activa para hacer que el siguiente handshake fuese m\u00e1s r\u00e1pido. Este error es una regresi\u00f3n y es id\u00e9ntico a CVE-2016-5419, reportado el 3 de agosto de 2016, pero afectando a un rango de versiones diferente." } ], "id": "CVE-2017-7468", "lastModified": "2024-11-21T03:31:57.863", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 2.5, "source": "secalert@redhat.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-07-16T13:29:00.287", "references": [ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/97962" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1038341" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7468" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://curl.haxx.se/docs/adv_20170419.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201709-14" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/97962" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1038341" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7468" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://curl.haxx.se/docs/adv_20170419.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201709-14" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-295" } ], "source": "secalert@redhat.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-295" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-08-05 21:15
Modified
2025-06-09 15:15
Severity ?
3.7 (Low) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
3.7 (Low) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
3.7 (Low) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
Summary
libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse, if one of them matches the setup.Due to errors in the logic, the config matching function did not take 'issuercert' into account and it compared the involved paths *case insensitively*,which could lead to libcurl reusing wrong connections.File paths are, or can be, case sensitive on many systems but not all, and caneven vary depending on used file systems.The comparison also didn't include the 'issuer cert' which a transfer can setto qualify how to verify the server certificate.
References
▶ | URL | Tags | |
---|---|---|---|
support@hackerone.com | https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf | Patch, Third Party Advisory | |
support@hackerone.com | https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf | Third Party Advisory | |
support@hackerone.com | https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf | Third Party Advisory | |
support@hackerone.com | https://hackerone.com/reports/1223565 | Exploit, Issue Tracking, Patch, Third Party Advisory | |
support@hackerone.com | https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cdev.kafka.apache.org%3E | Mailing List, Third Party Advisory | |
support@hackerone.com | https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cusers.kafka.apache.org%3E | Mailing List, Third Party Advisory | |
support@hackerone.com | https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cdev.kafka.apache.org%3E | Mailing List, Third Party Advisory | |
support@hackerone.com | https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cusers.kafka.apache.org%3E | Mailing List, Third Party Advisory | |
support@hackerone.com | https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html | Mailing List, Third Party Advisory | |
support@hackerone.com | https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html | Mailing List, Third Party Advisory | |
support@hackerone.com | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/ | Mailing List, Third Party Advisory | |
support@hackerone.com | https://security.netapp.com/advisory/ntap-20210902-0003/ | Third Party Advisory | |
support@hackerone.com | https://www.debian.org/security/2022/dsa-5197 | Third Party Advisory | |
support@hackerone.com | https://www.oracle.com/security-alerts/cpujan2022.html | Patch, Third Party Advisory | |
support@hackerone.com | https://www.oracle.com/security-alerts/cpuoct2021.html | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://hackerone.com/reports/1223565 | Exploit, Issue Tracking, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cdev.kafka.apache.org%3E | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cusers.kafka.apache.org%3E | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cdev.kafka.apache.org%3E | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cusers.kafka.apache.org%3E | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/ | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20210902-0003/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2022/dsa-5197 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/security-alerts/cpujan2022.html | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/security-alerts/cpuoct2021.html | Patch, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
haxx | libcurl | * | |
fedoraproject | fedora | 33 | |
debian | debian_linux | 9.0 | |
debian | debian_linux | 10.0 | |
debian | debian_linux | 11.0 | |
netapp | cloud_backup | - | |
netapp | clustered_data_ontap | - | |
netapp | solidfire_\&_hci_management_node | - | |
netapp | solidfire_baseboard_management_controller_firmware | - | |
oracle | mysql_server | * | |
oracle | mysql_server | * | |
oracle | peoplesoft_enterprise_peopletools | 8.57 | |
oracle | peoplesoft_enterprise_peopletools | 8.58 | |
oracle | peoplesoft_enterprise_peopletools | 8.59 | |
siemens | sinec_infrastructure_network_services | * | |
siemens | sinema_remote_connect_server | * | |
siemens | logo\!_cmr2040_firmware | * | |
siemens | logo\!_cmr2040 | - | |
siemens | logo\!_cmr2020_firmware | * | |
siemens | logo\!_cmr2020 | - | |
siemens | ruggedcomrm_1224_lte_firmware | * | |
siemens | ruggedcomrm_1224_lte | - | |
siemens | scalance_m804pb_firmware | * | |
siemens | scalance_m804pb | - | |
siemens | scalance_m812-1_firmware | * | |
siemens | scalance_m812-1 | - | |
siemens | scalance_m816-1_firmware | * | |
siemens | scalance_m816-1 | - | |
siemens | scalance_m826-2_firmware | * | |
siemens | scalance_m826-2 | - | |
siemens | scalance_m874-2_firmware | * | |
siemens | scalance_m874-2 | - | |
siemens | scalance_m874-3_firmware | * | |
siemens | scalance_m874-3 | - | |
siemens | scalance_m876-3_firmware | * | |
siemens | scalance_m876-3 | - | |
siemens | scalance_m876-4_firmware | * | |
siemens | scalance_m876-4 | - | |
siemens | scalance_mum856-1_firmware | * | |
siemens | scalance_mum856-1 | - | |
siemens | scalance_s615_firmware | * | |
siemens | scalance_s615 | - | |
siemens | simatic_cp_1543-1_firmware | * | |
siemens | simatic_cp_1543-1 | - | |
siemens | simatic_cp_1545-1_firmware | * | |
siemens | simatic_cp_1545-1 | - | |
siemens | simatic_rtu3010c_firmware | * | |
siemens | simatic_rtu3010c | - | |
siemens | simatic_rtu3030c_firmware | * | |
siemens | simatic_rtu3030c | - | |
siemens | simatic_rtu3031c_firmware | * | |
siemens | simatic_rtu3031c | - | |
siemens | simatic_rtu_3041c_firmware | * | |
siemens | simatic_rtu_3041c | - | |
siemens | sinema_remote_connect | * | |
siemens | siplus_net_cp_1543-1_firmware | * | |
siemens | siplus_net_cp_1543-1 | - | |
splunk | universal_forwarder | * | |
splunk | universal_forwarder | * | |
splunk | universal_forwarder | 9.1.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*", "matchCriteriaId": "6FDD6146-08DE-414A-AF65-668F1A002099", "versionEndExcluding": "7.77.0", "versionStartIncluding": "7.10.4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C2089EE-5D7F-47EC-8EA5-0F69790564C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*", "matchCriteriaId": "1FE996B1-6951-4F85-AA58-B99A379D2163", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:solidfire_\\\u0026_hci_management_node:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6D700C5-F67F-4FFB-BE69-D524592A3D2E", "vulnerable": true }, { "criteria": "cpe:2.3:o:netapp:solidfire_baseboard_management_controller_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB9B8171-F6CA-427D-81E0-6536D3BBFA8D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E74B879-B396-496C-979B-8A7211EDCA0D", "versionEndIncluding": "5.7.36", "versionStartIncluding": "5.7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "709E83B4-8C66-4255-870B-2F72B37BA8C6", "versionEndIncluding": "8.0.26", "versionStartIncluding": "8.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*", "matchCriteriaId": "7E1E416B-920B-49A0-9523-382898C2979D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*", "matchCriteriaId": "D9DB4A14-2EF5-4B54-95D2-75E6CF9AA0A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.59:*:*:*:*:*:*:*", "matchCriteriaId": "C8AF00C6-B97F-414D-A8DF-057E6BFD8597", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*", "matchCriteriaId": "B0F46497-4AB0-49A7-9453-CC26837BF253", "versionEndExcluding": "1.0.1.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:sinema_remote_connect_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "98CC9C9A-FE14-4D50-A8EC-C309229356C8", "versionEndExcluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:logo\\!_cmr2040_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F58182A-EB6D-442B-846A-8BD5BE4313E6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:logo\\!_cmr2040:-:*:*:*:*:*:*:*", "matchCriteriaId": "6ED47A12-5637-40E2-BE39-B76B789C0DFD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:logo\\!_cmr2020_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85E0D5C4-F0DA-42D9-A594-CB1BE6E7451F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:logo\\!_cmr2020:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8E5F42B-63E3-4B2D-A03F-983F51EE0648", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:ruggedcomrm_1224_lte_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "139740E9-9828-4F2E-B11D-3BFE1B96992C", "versionEndExcluding": "7.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:ruggedcomrm_1224_lte:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A650A1E-4DB0-415A-9BF4-0016798CD622", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_m804pb_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "44695DA0-6E69-4444-BEBB-391E818B9FC0", "versionEndExcluding": "7.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_m804pb:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6EBA42A-93FF-4883-8626-EF78D38374D3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_m812-1_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "87B7BB84-89FC-440B-9647-6D5E99C46AED", "versionEndExcluding": "7.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_m812-1:-:*:*:*:*:*:*:*", "matchCriteriaId": "31EAEF72-8B41-44E0-A33B-753AF85A3106", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_m816-1_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F93C36C9-9E80-48B6-8025-0DA656B7AE0B", "versionEndExcluding": "7.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_m816-1:-:*:*:*:*:*:*:*", "matchCriteriaId": "5908438F-2575-46EB-AC96-5F33D018AFAC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_m826-2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "15374104-A17C-44B4-801F-C81D3FB97527", "versionEndExcluding": "7.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_m826-2:-:*:*:*:*:*:*:*", "matchCriteriaId": "60458734-FF87-48E9-9B63-5AB9EA5ED0E5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_m874-2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E587E31C-E9CA-4925-A2FE-22F46C5A3E81", "versionEndExcluding": "7.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_m874-2:-:*:*:*:*:*:*:*", "matchCriteriaId": "C933ED27-2206-4734-8EB8-6A6431D1FBF1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_m874-3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DE82B624-BD88-4B43-A590-FF39D136A4D4", "versionEndExcluding": "7.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_m874-3:-:*:*:*:*:*:*:*", "matchCriteriaId": "D3258DC7-0461-4C65-8292-85C9965EA83D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_m876-3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC0626BD-AAE2-4853-AC96-8A3F2516A972", "versionEndExcluding": "7.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_m876-3:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD221BA9-3448-49E4-B3A3-D88B939785AC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_m876-4_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "60DD88D4-3DB3-473C-8613-AE425E7DF03C", "versionEndExcluding": "7.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_m876-4:-:*:*:*:*:*:*:*", "matchCriteriaId": "94E4CCE9-71F7-4960-B7DE-5298EFB7C619", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_mum856-1_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "03B602E7-05E4-42F7-8850-2369F118D32C", "versionEndExcluding": "7.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_mum856-1:-:*:*:*:*:*:*:*", "matchCriteriaId": "17BEBCAB-D640-4F6D-9579-4A54C76D80F8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_s615_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "116A0913-61A8-41EA-89D1-AC46384254B8", "versionEndExcluding": "7.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_s615:-:*:*:*:*:*:*:*", "matchCriteriaId": "E917CBBB-EF41-4113-B0CA-EB91889235E7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_cp_1543-1_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BFC6ACFD-8893-4EA3-976B-FAAF7240C5DB", "versionEndExcluding": "3.0.22", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_cp_1543-1:-:*:*:*:*:*:*:*", "matchCriteriaId": "3FDE92FB-38C7-46E8-9208-BBD7872219D5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_cp_1545-1_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D599BF67-DFBB-4107-ACD9-1231D12EC9B5", "versionEndExcluding": "1.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_cp_1545-1:-:*:*:*:*:*:*:*", "matchCriteriaId": "C557DEBB-B71C-42E5-BBCE-0CFF3D10D700", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_rtu3010c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "22BE5ED5-4690-4D60-AA95-915CC02266E2", "versionEndExcluding": "5.0.14", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_rtu3010c:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F32339C-D992-45F3-B975-D3E1118B881E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_rtu3030c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BD88F06C-6E0F-463C-94E5-CB68601D728E", "versionEndExcluding": "5.0.14", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_rtu3030c:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A66DD04-4C58-45D8-A8C5-6817B05DBA14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_rtu3031c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BBFBC62C-7F21-4312-B6BB-FC80894100BB", "versionEndExcluding": "5.0.14", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_rtu3031c:-:*:*:*:*:*:*:*", "matchCriteriaId": "48F0595C-286F-4EB1-8C25-D20FB92A95A0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_rtu_3041c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "74D4B0B4-6F7C-43CF-AFB8-6C53BA5C6577", "versionEndExcluding": "5.0.14", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_rtu_3041c:-:*:*:*:*:*:*:*", "matchCriteriaId": "F30B6004-31BF-408A-B1C5-4A7937391F41", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:sinema_remote_connect:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C5E4FE6-D2D5-40E4-A68C-6EA6AC7E1A3C", "versionEndExcluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:siplus_net_cp_1543-1_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "43CDCCE3-B8C0-44D4-A8A0-25C49A4EA240", "versionEndExcluding": "3.0.22", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:siplus_net_cp_1543-1:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D7AB0D5-FD3E-416A-975B-D212B3350433", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:*", "matchCriteriaId": "5722E753-75DE-4944-A11B-556CB299B57D", "versionEndExcluding": "8.2.12", "versionStartIncluding": "8.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:*", "matchCriteriaId": "DC0F9351-81A4-4FEA-B6B5-6E960A933D32", "versionEndExcluding": "9.0.6", "versionStartIncluding": "9.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:splunk:universal_forwarder:9.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "EED24E67-2957-4C1B-8FEA-E2D2FE7B97FC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse, if one of them matches the setup.Due to errors in the logic, the config matching function did not take \u0027issuercert\u0027 into account and it compared the involved paths *case insensitively*,which could lead to libcurl reusing wrong connections.File paths are, or can be, case sensitive on many systems but not all, and caneven vary depending on used file systems.The comparison also didn\u0027t include the \u0027issuer cert\u0027 which a transfer can setto qualify how to verify the server certificate." }, { "lang": "es", "value": "libcurl mantiene las conexiones usadas previamente en un pool de conexiones para reusarlas en posteriores transferencias, si una de ellas coincide con la configuraci\u00f3n. Debido a errores en la l\u00f3gica, la funci\u00f3n de coincidencia de la configuraci\u00f3n no ten\u00eda en cuenta \"issuercert\" y comparaba las rutas implicadas *sin tener en cuenta el caso*, que pod\u00eda conllevar a que libcurl reusara conexiones err\u00f3neas. Las rutas de los archivos son, o pueden ser, casos confidenciales en muchos sistemas, pero no en todos, y pueden incluso variar dependiendo de los sistemas de archivos usados. La comparaci\u00f3n tampoco inclu\u00eda el \"issuercert\" que una transferencia puede ajustar para calificar c\u00f3mo verificar el certificado del servidor" } ], "id": "CVE-2021-22924", "lastModified": "2025-06-09T15:15:24.403", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 1.4, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2021-08-05T21:15:11.380", "references": [ { "source": "support@hackerone.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "source": "support@hackerone.com", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf" }, { "source": "support@hackerone.com", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf" }, { "source": "support@hackerone.com", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://hackerone.com/reports/1223565" }, { "source": "support@hackerone.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cdev.kafka.apache.org%3E" }, { "source": "support@hackerone.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cusers.kafka.apache.org%3E" }, { "source": "support@hackerone.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cdev.kafka.apache.org%3E" }, { "source": "support@hackerone.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cusers.kafka.apache.org%3E" }, { "source": "support@hackerone.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html" }, { "source": "support@hackerone.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html" }, { "source": "support@hackerone.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/" }, { "source": "support@hackerone.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210902-0003/" }, { "source": "support@hackerone.com", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5197" }, { "source": "support@hackerone.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "source": "support@hackerone.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://hackerone.com/reports/1223565" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cdev.kafka.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cusers.kafka.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cdev.kafka.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cusers.kafka.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210902-0003/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5197" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" } ], "sourceIdentifier": "support@hackerone.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "support@hackerone.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-706" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-03-30 20:15
Modified
2025-06-09 15:15
Severity ?
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
7.7 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
7.7 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
Summary
An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.
References
▶ | URL | Tags | |
---|---|---|---|
support@hackerone.com | https://hackerone.com/reports/1898475 | Exploit, Third Party Advisory | |
support@hackerone.com | https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html | Mailing List | |
support@hackerone.com | https://security.gentoo.org/glsa/202310-12 | Third Party Advisory | |
support@hackerone.com | https://security.netapp.com/advisory/ntap-20230420-0010/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://hackerone.com/reports/1898475 | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html | Mailing List | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/202310-12 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20230420-0010/ | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
haxx | libcurl | * | |
fedoraproject | fedora | 36 | |
debian | debian_linux | 10.0 | |
netapp | active_iq_unified_manager | - | |
netapp | clustered_data_ontap | 9.0 | |
broadcom | brocade_fabric_operating_system_firmware | - | |
netapp | h300s_firmware | - | |
netapp | h300s | - | |
netapp | h500s_firmware | - | |
netapp | h500s | - | |
netapp | h700s_firmware | - | |
netapp | h700s | - | |
netapp | h410s_firmware | - | |
netapp | h410s | - | |
splunk | universal_forwarder | * | |
splunk | universal_forwarder | * | |
splunk | universal_forwarder | 9.1.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*", "matchCriteriaId": "D3ABEE9E-8E0B-4B8D-8913-D86B9CB05769", "versionEndExcluding": "8.0.0", "versionStartIncluding": "7.16.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", "matchCriteriaId": "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:clustered_data_ontap:9.0:-:*:*:*:*:*:*", "matchCriteriaId": "52DE3DFE-350F-4E83-B425-1D7D47BEF6DA", "vulnerable": true }, { "criteria": "cpe:2.3:o:broadcom:brocade_fabric_operating_system_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2748912-FC54-47F6-8C0C-B96784765B8E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6770B6C3-732E-4E22-BF1C-2D2FD610061C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F9C8C20-42EB-4AB5-BD97-212DEB070C43", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FFF7106-ED78-49BA-9EC5-B889E3685D53", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*", "matchCriteriaId": "E63D8B0F-006E-4801-BF9D-1C001BBFB4F9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "56409CEC-5A1E-4450-AA42-641E459CC2AF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*", "matchCriteriaId": "B06F4839-D16A-4A61-9BB5-55B13F41E47F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0B4AD8A-F172-4558-AEC6-FF424BA2D912", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*", "matchCriteriaId": "8497A4C9-8474-4A62-8331-3FE862ED4098", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:*", "matchCriteriaId": "5722E753-75DE-4944-A11B-556CB299B57D", "versionEndExcluding": "8.2.12", "versionStartIncluding": "8.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:*", "matchCriteriaId": "DC0F9351-81A4-4FEA-B6B5-6E960A933D32", "versionEndExcluding": "9.0.6", "versionStartIncluding": "9.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:splunk:universal_forwarder:9.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "EED24E67-2957-4C1B-8FEA-E2D2FE7B97FC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection." } ], "id": "CVE-2023-27538", "lastModified": "2025-06-09T15:15:29.150", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.5, "impactScore": 5.2, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2023-03-30T20:15:07.677", "references": [ { "source": "support@hackerone.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://hackerone.com/reports/1898475" }, { "source": "support@hackerone.com", "tags": [ "Mailing List" ], "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html" }, { "source": "support@hackerone.com", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202310-12" }, { "source": "support@hackerone.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20230420-0010/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://hackerone.com/reports/1898475" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202310-12" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20230420-0010/" } ], "sourceIdentifier": "support@hackerone.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-305" } ], "source": "support@hackerone.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-01-15 15:59
Modified
2025-04-12 10:46
Severity ?
Summary
The darwinssl_connect_step1 function in lib/vtls/curl_darwinssl.c in libcurl 7.31.0 through 7.39.0, when using the DarwinSSL (aka SecureTransport) back-end for TLS, does not check if a cached TLS session validated the certificate when reusing the session, which allows man-in-the-middle attackers to spoof servers via a crafted certificate.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://curl.haxx.se/docs/adv_20150108A.html | Vendor Advisory | |
secalert@redhat.com | http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743 | ||
secalert@redhat.com | http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html | ||
secalert@redhat.com | http://secunia.com/advisories/61925 | ||
secalert@redhat.com | https://security.gentoo.org/glsa/201701-47 | ||
secalert@redhat.com | https://support.apple.com/kb/HT205031 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://curl.haxx.se/docs/adv_20150108A.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/61925 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/201701-47 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT205031 |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "7883E465-932D-4C11-AA54-97E44181F906", "versionEndIncluding": "10.10.4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*", "matchCriteriaId": "1791BF6D-2C96-4A6E-90D4-2906A73601F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*", "matchCriteriaId": "260DD751-4145-4B75-B892-5FC932C6A305", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*", "matchCriteriaId": "EFF4AD0D-2EC5-4CE8-B6B3-2EC8ED2FF118", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*", "matchCriteriaId": "3EB1CB85-0A9B-4816-B471-278774EE6D4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*", "matchCriteriaId": "3831AB03-4E7E-476D-9623-58AADC188DFE", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*", "matchCriteriaId": "ABACE305-2F0C-4B59-BC5C-6DF162B450E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*", "matchCriteriaId": "6FAC1B55-F492-484E-B837-E7745682DE0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.37.1:*:*:*:*:*:*:*", "matchCriteriaId": "E0D57914-B40A-462B-9C78-6433BE2B2DB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.38.0:*:*:*:*:*:*:*", "matchCriteriaId": "A9A12DF7-62C5-46AD-9236-E2821C64156E", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.39:*:*:*:*:*:*:*", "matchCriteriaId": "4C43697D-390A-4AC0-A5D8-62B6D22245BF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The darwinssl_connect_step1 function in lib/vtls/curl_darwinssl.c in libcurl 7.31.0 through 7.39.0, when using the DarwinSSL (aka SecureTransport) back-end for TLS, does not check if a cached TLS session validated the certificate when reusing the session, which allows man-in-the-middle attackers to spoof servers via a crafted certificate." }, { "lang": "es", "value": "La funci\u00f3n darwinssl_connect_step1 en lib/vtls/curl_darwinssl.c en libcurl 7.31.0 hasta 7.39.0, cuando utiliza el backend DarwinSSL (tambi\u00e9n conocido como SecureTransport) para TLS, no comprueba si una sesi\u00f3n TLS en cach\u00e9 valid\u00f3 el certificado cuando se reutiliza la sesi\u00f3n, lo que permite a atacantes man-in-the-middle falsificar servidores a trav\u00e9s de un certificado manipulado." } ], "evaluatorComment": "\u003ca href=\"http://cwe.mitre.org/data/definitions/295.html\"\u003eCWE-295: Improper Certificate Validation\u003c/a\u003e", "id": "CVE-2014-8151", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2015-01-15T15:59:07.670", "references": [ { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://curl.haxx.se/docs/adv_20150108A.html" }, { "source": "secalert@redhat.com", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10743" }, { "source": "secalert@redhat.com", "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/61925" }, { "source": "secalert@redhat.com", "url": "https://security.gentoo.org/glsa/201701-47" }, { "source": "secalert@redhat.com", "url": "https://support.apple.com/kb/HT205031" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://curl.haxx.se/docs/adv_20150108A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10743" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/61925" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201701-47" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.apple.com/kb/HT205031" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-06-22 19:59
Modified
2025-04-12 10:46
Severity ?
Summary
cURL and libcurl 7.40.0 through 7.42.1 send the HTTP Basic authentication credentials for a previous connection when reusing a reset (curl_easy_reset) connection handle to send a request to the same host name, which allows remote attackers to obtain sensitive information via unspecified vectors.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://curl.haxx.se/docs/adv_20150617A.html | Vendor Advisory | |
secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160660.html | ||
secalert@redhat.com | http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html | Patch, Third Party Advisory | |
secalert@redhat.com | http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html | ||
secalert@redhat.com | http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html | ||
secalert@redhat.com | http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html | Patch, Third Party Advisory | |
secalert@redhat.com | http://www.securityfocus.com/bid/75385 | ||
secalert@redhat.com | http://www.securityfocus.com/bid/91787 | Third Party Advisory, VDB Entry | |
secalert@redhat.com | https://kc.mcafee.com/corporate/index?page=content&id=SB10131 | ||
secalert@redhat.com | https://security.gentoo.org/glsa/201509-02 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://curl.haxx.se/docs/adv_20150617A.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160660.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/75385 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/91787 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://kc.mcafee.com/corporate/index?page=content&id=SB10131 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/201509-02 |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:haxx:curl:7.40.0:*:*:*:*:*:*:*", "matchCriteriaId": "5DEBBFCA-6A18-4F8F-B841-50255C952FA0", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.41.0:*:*:*:*:*:*:*", "matchCriteriaId": "FEEAE437-A645-468B-B283-44799658F534", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.42.0:*:*:*:*:*:*:*", "matchCriteriaId": "03F7EE95-4EBE-4306-ADFE-A1A92CAD5F24", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.42.1:*:*:*:*:*:*:*", "matchCriteriaId": "79F7AE71-7A18-4737-9C02-0A3343B3AD4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.40.0:*:*:*:*:*:*:*", "matchCriteriaId": "D52E9E9F-7A35-4CB9-813E-5A1D4A36415C", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.41.0:*:*:*:*:*:*:*", "matchCriteriaId": "257291FB-969C-4413-BA81-806B5E1B40A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.42.0:*:*:*:*:*:*:*", "matchCriteriaId": "88DC6ED5-4C1A-4ED0-97BA-B245C4A236C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.42.1:*:*:*:*:*:*:*", "matchCriteriaId": "51AA7383-3AA1-4A3B-BA46-BBA8FBDC10DD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "cURL and libcurl 7.40.0 through 7.42.1 send the HTTP Basic authentication credentials for a previous connection when reusing a reset (curl_easy_reset) connection handle to send a request to the same host name, which allows remote attackers to obtain sensitive information via unspecified vectors." }, { "lang": "es", "value": "cURL y libcurl 7.40.0 hasta la versi\u00f3n 7.42.1 mandan las credenciales de autenticaci\u00f3n HTTP Basic de una conexi\u00f3n previa cuando se reutiliza en una conexi\u00f3n de reinicio (curl_easy_reset) usada para enviar una petici\u00f3n al mismo nombre de anfitri\u00f3n, lo que permite a atacantes remotos obtener informaci\u00f3n sensible a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2015-3236", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-06-22T19:59:03.683", "references": [ { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://curl.haxx.se/docs/adv_20150617A.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160660.html" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" }, { "source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/75385" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/91787" }, { "source": "secalert@redhat.com", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10131" }, { "source": "secalert@redhat.com", "url": "https://security.gentoo.org/glsa/201509-02" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://curl.haxx.se/docs/adv_20150617A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160660.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/75385" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/91787" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10131" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201509-02" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2016-10-03 21:59
Modified
2025-04-12 10:46
Severity ?
Summary
curl and libcurl before 7.50.2, when built with NSS and the libnsspem.so library is available at runtime, allow remote attackers to hijack the authentication of a TLS connection by leveraging reuse of a previously loaded client certificate from file for a connection for which no certificate has been set, a different vulnerability than CVE-2016-5420.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://lists.opensuse.org/opensuse-updates/2016-09/msg00094.html | Third Party Advisory | |
cve@mitre.org | http://rhn.redhat.com/errata/RHSA-2016-2575.html | ||
cve@mitre.org | http://rhn.redhat.com/errata/RHSA-2016-2957.html | ||
cve@mitre.org | http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html | ||
cve@mitre.org | http://www.securityfocus.com/bid/92754 | Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.securitytracker.com/id/1036739 | Third Party Advisory, VDB Entry | |
cve@mitre.org | https://access.redhat.com/errata/RHSA-2018:3558 | ||
cve@mitre.org | https://bugzilla.redhat.com/show_bug.cgi?id=1373229 | Issue Tracking | |
cve@mitre.org | https://curl.haxx.se/docs/adv_20160907.html | Patch, Vendor Advisory | |
cve@mitre.org | https://github.com/curl/curl/commit/curl-7_50_2~32 | Issue Tracking, Patch | |
cve@mitre.org | https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html | ||
cve@mitre.org | https://security.gentoo.org/glsa/201701-47 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-updates/2016-09/msg00094.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2016-2575.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2016-2957.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/92754 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1036739 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:3558 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=1373229 | Issue Tracking | |
af854a3a-2127-422b-91ae-364da2661108 | https://curl.haxx.se/docs/adv_20160907.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/curl/curl/commit/curl-7_50_2~32 | Issue Tracking, Patch | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html | ||
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/201701-47 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "matchCriteriaId": "4863BE36-D16A-4D75-90D9-FD76DB5B48B7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*", "matchCriteriaId": "EDD64F99-36C3-408B-BABA-94F0B7FAE474", "versionEndIncluding": "7.50.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "curl and libcurl before 7.50.2, when built with NSS and the libnsspem.so library is available at runtime, allow remote attackers to hijack the authentication of a TLS connection by leveraging reuse of a previously loaded client certificate from file for a connection for which no certificate has been set, a different vulnerability than CVE-2016-5420." }, { "lang": "es", "value": "curl y libcurl en versiones anteriores a 7.50.2, cuando se construye con NSS y la librer\u00eda libnsspem.so est\u00e1 disponible en tiempo de ejecuci\u00f3n, permiten a atacantes remotos secuestrar la autenticaci\u00f3n de una conexi\u00f3n TLS aprovechando la reutilizaci\u00f3n de un certificado cliente cargado previamente desde un archivo para una conexi\u00f3n para el que no se ha configurado ning\u00fan certificado, una vulnerabilidad diferente a CVE-2016-5420." } ], "id": "CVE-2016-7141", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-10-03T21:59:08.300", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-09/msg00094.html" }, { "source": "cve@mitre.org", "url": "http://rhn.redhat.com/errata/RHSA-2016-2575.html" }, { "source": "cve@mitre.org", "url": "http://rhn.redhat.com/errata/RHSA-2016-2957.html" }, { "source": "cve@mitre.org", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/92754" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1036739" }, { "source": "cve@mitre.org", "url": "https://access.redhat.com/errata/RHSA-2018:3558" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1373229" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://curl.haxx.se/docs/adv_20160907.html" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/curl/curl/commit/curl-7_50_2~32" }, { "source": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html" }, { "source": "cve@mitre.org", "url": "https://security.gentoo.org/glsa/201701-47" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-09/msg00094.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2016-2575.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2016-2957.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/92754" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1036739" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2018:3558" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1373229" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://curl.haxx.se/docs/adv_20160907.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/curl/curl/commit/curl-7_50_2~32" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201701-47" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-02-06 20:29
Modified
2024-11-21 04:42
Severity ?
4.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
7.5 (High) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
libcurl versions from 7.34.0 to before 7.64.0 are vulnerable to a heap out-of-bounds read in the code handling the end-of-response for SMTP. If the buffer passed to `smtp_endofresp()` isn't NUL terminated and contains no character ending the parsed number, and `len` is set to 5, then the `strtol()` call reads beyond the allocated buffer. The read contents will not be returned to the caller.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://www.securityfocus.com/bid/106950 | Third Party Advisory, VDB Entry | |
secalert@redhat.com | https://access.redhat.com/errata/RHSA-2019:3701 | ||
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3823 | Exploit, Issue Tracking, Patch, Third Party Advisory | |
secalert@redhat.com | https://cert-portal.siemens.com/productcert/pdf/ssa-936080.pdf | ||
secalert@redhat.com | https://curl.haxx.se/docs/CVE-2019-3823.html | Patch, Vendor Advisory | |
secalert@redhat.com | https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f%40%3Cdevnull.infra.apache.org%3E | ||
secalert@redhat.com | https://security.gentoo.org/glsa/201903-03 | Third Party Advisory | |
secalert@redhat.com | https://security.netapp.com/advisory/ntap-20190315-0001/ | Exploit, Third Party Advisory | |
secalert@redhat.com | https://usn.ubuntu.com/3882-1/ | Third Party Advisory | |
secalert@redhat.com | https://www.debian.org/security/2019/dsa-4386 | Third Party Advisory | |
secalert@redhat.com | https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html | Patch, Third Party Advisory | |
secalert@redhat.com | https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/106950 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2019:3701 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3823 | Exploit, Issue Tracking, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-936080.pdf | ||
af854a3a-2127-422b-91ae-364da2661108 | https://curl.haxx.se/docs/CVE-2019-3823.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f%40%3Cdevnull.infra.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/201903-03 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20190315-0001/ | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3882-1/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2019/dsa-4386 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
haxx | libcurl | * | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 16.04 | |
canonical | ubuntu_linux | 18.04 | |
canonical | ubuntu_linux | 18.10 | |
debian | debian_linux | 9.0 | |
netapp | clustered_data_ontap | * | |
oracle | communications_operations_monitor | 3.4 | |
oracle | communications_operations_monitor | 4.0 | |
oracle | http_server | 12.2.1.3.0 | |
oracle | secure_global_desktop | 5.4 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA479CAB-06B4-450E-B78A-60A623E62863", "versionEndExcluding": "7.64.0", "versionStartIncluding": "7.34.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*", "matchCriteriaId": "07C312A0-CD2C-4B9C-B064-6409B25C278F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:clustered_data_ontap:*:*:*:*:*:*:*:*", "matchCriteriaId": "B0E976A9-6253-4DF5-9370-471D0469B395", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:communications_operations_monitor:3.4:*:*:*:*:*:*:*", "matchCriteriaId": "D52F557F-D0A0-43D3-85F1-F10B6EBFAEDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_operations_monitor:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "E3517A27-E6EE-497C-9996-F78171BBE90F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "DFC79B17-E9D2-44D5-93ED-2F959E7A3D43", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:secure_global_desktop:5.4:*:*:*:*:*:*:*", "matchCriteriaId": "B5265C91-FF5C-4451-A7C2-D388A65ACFA2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "libcurl versions from 7.34.0 to before 7.64.0 are vulnerable to a heap out-of-bounds read in the code handling the end-of-response for SMTP. If the buffer passed to `smtp_endofresp()` isn\u0027t NUL terminated and contains no character ending the parsed number, and `len` is set to 5, then the `strtol()` call reads beyond the allocated buffer. The read contents will not be returned to the caller." }, { "lang": "es", "value": "libcurl, desde la versi\u00f3n 7.34.0 hasta antes de la 7.64.0, es vulnerable a una lectura de memoria din\u00e1mica (heap) fuera de l\u00edmites en el c\u00f3digo que maneja el final de la respuesta para SMTP. Si el b\u00fafer que se pasa a \"smtp_endofresp()\" no termina en NUL, no contiene caracteres que terminen el n\u00famero analizado y \"len\" se establece como 5, la llamada \"strtol()\" lee m\u00e1s all\u00e1 del b\u00fafer asignado. Los contenidos de la lectura no se devolver\u00e1n al llamante." } ], "id": "CVE-2019-3823", "lastModified": "2024-11-21T04:42:37.110", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "secalert@redhat.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-02-06T20:29:00.400", "references": [ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106950" }, { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2019:3701" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3823" }, { "source": "secalert@redhat.com", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-936080.pdf" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://curl.haxx.se/docs/CVE-2019-3823.html" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f%40%3Cdevnull.infra.apache.org%3E" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201903-03" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20190315-0001/" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3882-1/" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2019/dsa-4386" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "source": "secalert@redhat.com", "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106950" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2019:3701" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3823" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-936080.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://curl.haxx.se/docs/CVE-2019-3823.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f%40%3Cdevnull.infra.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201903-03" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20190315-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3882-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2019/dsa-4386" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "secalert@redhat.com", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2023-03-30 20:15
Modified
2024-11-21 07:53
Severity ?
Summary
A double free vulnerability exists in libcurl <8.0.0 when sharing HSTS data between separate "handles". This sharing was introduced without considerations for do this sharing across separate threads but there was no indication of this fact in the documentation. Due to missing mutexes or thread locks, two threads sharing the same HSTS data could end up doing a double-free or use-after-free.
References
▶ | URL | Tags | |
---|---|---|---|
support@hackerone.com | https://hackerone.com/reports/1897203 | Exploit, Third Party Advisory | |
support@hackerone.com | https://security.gentoo.org/glsa/202310-12 | Third Party Advisory | |
support@hackerone.com | https://security.netapp.com/advisory/ntap-20230420-0010/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://hackerone.com/reports/1897203 | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/202310-12 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20230420-0010/ | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
haxx | libcurl | 7.88.0 | |
haxx | libcurl | 7.88.1 | |
netapp | active_iq_unified_manager | - | |
netapp | clustered_data_ontap | 9.0 | |
broadcom | brocade_fabric_operating_system_firmware | - | |
netapp | h300s_firmware | - | |
netapp | h300s | - | |
netapp | h500s_firmware | - | |
netapp | h500s | - | |
netapp | h700s_firmware | - | |
netapp | h700s | - | |
netapp | h410s_firmware | - | |
netapp | h410s | - | |
splunk | universal_forwarder | * | |
splunk | universal_forwarder | * | |
splunk | universal_forwarder | 9.1.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:haxx:libcurl:7.88.0:*:*:*:*:*:*:*", "matchCriteriaId": "A5DDC50E-6E2E-4F49-AD48-18AAFEE7148D", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.88.1:*:*:*:*:*:*:*", "matchCriteriaId": "54DA1679-739A-4C30-8C5F-81AB65B0873E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", "matchCriteriaId": "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:clustered_data_ontap:9.0:-:*:*:*:*:*:*", "matchCriteriaId": "52DE3DFE-350F-4E83-B425-1D7D47BEF6DA", "vulnerable": true }, { "criteria": "cpe:2.3:o:broadcom:brocade_fabric_operating_system_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2748912-FC54-47F6-8C0C-B96784765B8E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6770B6C3-732E-4E22-BF1C-2D2FD610061C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F9C8C20-42EB-4AB5-BD97-212DEB070C43", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FFF7106-ED78-49BA-9EC5-B889E3685D53", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*", "matchCriteriaId": "E63D8B0F-006E-4801-BF9D-1C001BBFB4F9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "56409CEC-5A1E-4450-AA42-641E459CC2AF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*", "matchCriteriaId": "B06F4839-D16A-4A61-9BB5-55B13F41E47F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0B4AD8A-F172-4558-AEC6-FF424BA2D912", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*", "matchCriteriaId": "8497A4C9-8474-4A62-8331-3FE862ED4098", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:*", "matchCriteriaId": "5722E753-75DE-4944-A11B-556CB299B57D", "versionEndExcluding": "8.2.12", "versionStartIncluding": "8.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:*", "matchCriteriaId": "DC0F9351-81A4-4FEA-B6B5-6E960A933D32", "versionEndExcluding": "9.0.6", "versionStartIncluding": "9.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:splunk:universal_forwarder:9.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "EED24E67-2957-4C1B-8FEA-E2D2FE7B97FC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A double free vulnerability exists in libcurl \u003c8.0.0 when sharing HSTS data between separate \"handles\". This sharing was introduced without considerations for do this sharing across separate threads but there was no indication of this fact in the documentation. Due to missing mutexes or thread locks, two threads sharing the same HSTS data could end up doing a double-free or use-after-free." } ], "id": "CVE-2023-27537", "lastModified": "2024-11-21T07:53:07.407", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-03-30T20:15:07.617", "references": [ { "source": "support@hackerone.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://hackerone.com/reports/1897203" }, { "source": "support@hackerone.com", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202310-12" }, { "source": "support@hackerone.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20230420-0010/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://hackerone.com/reports/1897203" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202310-12" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20230420-0010/" } ], "sourceIdentifier": "support@hackerone.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-415" } ], "source": "support@hackerone.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-415" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-03-30 20:15
Modified
2025-02-14 16:15
Severity ?
5.9 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
5.9 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
5.9 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Summary
An authentication bypass vulnerability exists libcurl <8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.
References
▶ | URL | Tags | |
---|---|---|---|
support@hackerone.com | https://hackerone.com/reports/1895135 | Exploit, Third Party Advisory | |
support@hackerone.com | https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html | Mailing List, Third Party Advisory | |
support@hackerone.com | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/ | Mailing List, Third Party Advisory | |
support@hackerone.com | https://security.gentoo.org/glsa/202310-12 | Third Party Advisory | |
support@hackerone.com | https://security.netapp.com/advisory/ntap-20230420-0010/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://hackerone.com/reports/1895135 | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/ | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/202310-12 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20230420-0010/ | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
haxx | libcurl | * | |
fedoraproject | fedora | 36 | |
debian | debian_linux | 10.0 | |
netapp | active_iq_unified_manager | - | |
netapp | h300s_firmware | - | |
netapp | h300s | - | |
netapp | h500s_firmware | - | |
netapp | h500s | - | |
netapp | h700s_firmware | - | |
netapp | h700s | - | |
netapp | h410s_firmware | - | |
netapp | h410s | - | |
netapp | ontap | 9 | |
splunk | universal_forwarder | * | |
splunk | universal_forwarder | * | |
splunk | universal_forwarder | 9.1.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*", "matchCriteriaId": "1FD7CD4C-BF3D-41DD-AC3F-005FB087CE0A", "versionEndIncluding": "7.88.1", "versionStartIncluding": "7.22.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", "matchCriteriaId": "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6770B6C3-732E-4E22-BF1C-2D2FD610061C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F9C8C20-42EB-4AB5-BD97-212DEB070C43", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FFF7106-ED78-49BA-9EC5-B889E3685D53", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*", "matchCriteriaId": "E63D8B0F-006E-4801-BF9D-1C001BBFB4F9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "56409CEC-5A1E-4450-AA42-641E459CC2AF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*", "matchCriteriaId": "B06F4839-D16A-4A61-9BB5-55B13F41E47F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0B4AD8A-F172-4558-AEC6-FF424BA2D912", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*", "matchCriteriaId": "8497A4C9-8474-4A62-8331-3FE862ED4098", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:ontap:9:*:*:*:*:*:*:*", "matchCriteriaId": "A20333EE-4C13-426E-8B54-D78679D5DDB8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:*", "matchCriteriaId": "5722E753-75DE-4944-A11B-556CB299B57D", "versionEndExcluding": "8.2.12", "versionStartIncluding": "8.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:*", "matchCriteriaId": "DC0F9351-81A4-4FEA-B6B5-6E960A933D32", "versionEndExcluding": "9.0.6", "versionStartIncluding": "9.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:splunk:universal_forwarder:9.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "EED24E67-2957-4C1B-8FEA-E2D2FE7B97FC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An authentication bypass vulnerability exists libcurl \u003c8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed." } ], "id": "CVE-2023-27536", "lastModified": "2025-02-14T16:15:33.497", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2023-03-30T20:15:07.547", "references": [ { "source": "support@hackerone.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://hackerone.com/reports/1895135" }, { "source": "support@hackerone.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html" }, { "source": "support@hackerone.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/" }, { "source": "support@hackerone.com", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202310-12" }, { "source": "support@hackerone.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20230420-0010/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://hackerone.com/reports/1895135" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202310-12" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20230420-0010/" } ], "sourceIdentifier": "support@hackerone.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-305" } ], "source": "support@hackerone.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-11-18 15:59
Modified
2025-04-12 10:46
Severity ?
Summary
cURL and libcurl before 7.38.0 does not properly handle IP addresses in cookie domain names, which allows remote attackers to set cookies for or send arbitrary cookies to certain sites, as demonstrated by a site at 192.168.0.1 setting cookies for a site at 127.168.0.1.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://curl.haxx.se/docs/adv_20140910A.html | Patch | |
secalert@redhat.com | http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743 | ||
secalert@redhat.com | http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html | ||
secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00024.html | ||
secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2015-1254.html | ||
secalert@redhat.com | http://www.debian.org/security/2014/dsa-3022 | Vendor Advisory | |
secalert@redhat.com | http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html | ||
secalert@redhat.com | http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html | ||
secalert@redhat.com | http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html | ||
secalert@redhat.com | http://www.securityfocus.com/bid/69748 | ||
secalert@redhat.com | https://support.apple.com/kb/HT205031 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://curl.haxx.se/docs/adv_20140910A.html | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00024.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2015-1254.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2014/dsa-3022 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/69748 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT205031 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
haxx | curl | * | |
haxx | curl | 7.31.0 | |
haxx | curl | 7.32.0 | |
haxx | curl | 7.33.0 | |
haxx | curl | 7.34.0 | |
haxx | curl | 7.35.0 | |
haxx | curl | 7.36.0 | |
haxx | curl | 7.37.0 | |
haxx | libcurl | * | |
haxx | libcurl | 7.31.0 | |
haxx | libcurl | 7.32.0 | |
haxx | libcurl | 7.33.0 | |
haxx | libcurl | 7.34.0 | |
haxx | libcurl | 7.35.0 | |
haxx | libcurl | 7.36.0 | |
haxx | libcurl | 7.37.0 | |
apple | mac_os_x | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*", "matchCriteriaId": "B72E7AFD-F700-4EE7-AC64-238AC573CDBA", "versionEndIncluding": "7.37.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.31.0:*:*:*:*:*:*:*", "matchCriteriaId": "5ECABFCB-0D02-4B5B-BB35-C6B3C0896348", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.32.0:*:*:*:*:*:*:*", "matchCriteriaId": "5A5176F0-E62F-46FF-B536-DC0680696773", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.33.0:*:*:*:*:*:*:*", "matchCriteriaId": "506A3761-3D24-43DB-88D8-4EB5B9E8BA5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.34.0:*:*:*:*:*:*:*", "matchCriteriaId": "0B6EF8B0-0E86-449C-A500-ACD902A78C7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.35.0:*:*:*:*:*:*:*", "matchCriteriaId": "4D558CC2-0146-4887-834E-19FCB1D512A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.36.0:*:*:*:*:*:*:*", "matchCriteriaId": "6931764D-16AB-4546-9CE3-5B4E03BC984A", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.37.0:*:*:*:*:*:*:*", "matchCriteriaId": "6FC1313E-8DCB-4B29-A9BC-A27C8CB360E9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*", "matchCriteriaId": "F0181855-D18C-49D9-8BC5-2EC16689B7EF", "versionEndIncluding": "7.37.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*", "matchCriteriaId": "1791BF6D-2C96-4A6E-90D4-2906A73601F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*", "matchCriteriaId": "260DD751-4145-4B75-B892-5FC932C6A305", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*", "matchCriteriaId": "EFF4AD0D-2EC5-4CE8-B6B3-2EC8ED2FF118", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*", "matchCriteriaId": "3EB1CB85-0A9B-4816-B471-278774EE6D4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*", "matchCriteriaId": "3831AB03-4E7E-476D-9623-58AADC188DFE", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*", "matchCriteriaId": "ABACE305-2F0C-4B59-BC5C-6DF162B450E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*", "matchCriteriaId": "6FAC1B55-F492-484E-B837-E7745682DE0A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "7883E465-932D-4C11-AA54-97E44181F906", "versionEndIncluding": "10.10.4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "cURL and libcurl before 7.38.0 does not properly handle IP addresses in cookie domain names, which allows remote attackers to set cookies for or send arbitrary cookies to certain sites, as demonstrated by a site at 192.168.0.1 setting cookies for a site at 127.168.0.1." }, { "lang": "es", "value": "cURL y libcurl anteriores a 7.38.0 no manejan correctamente las direcciones IP en nombres de dominio de cookies, lo que permite a atacantes remotos usar cookies definidas por ellos mismos o enviar cookies arbitrarias a ciertos sitios, como originada por un sitio en 192.168.0.1 estableciendo las cookies para un sitio en 127.168.0.1." } ], "id": "CVE-2014-3613", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-11-18T15:59:00.140", "references": [ { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://curl.haxx.se/docs/adv_20140910A.html" }, { "source": "secalert@redhat.com", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10743" }, { "source": "secalert@redhat.com", "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00024.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2015-1254.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://www.debian.org/security/2014/dsa-3022" }, { "source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/69748" }, { "source": "secalert@redhat.com", "url": "https://support.apple.com/kb/HT205031" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://curl.haxx.se/docs/adv_20140910A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10743" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00024.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2015-1254.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.debian.org/security/2014/dsa-3022" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/69748" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.apple.com/kb/HT205031" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-310" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-04-01 18:15
Modified
2025-06-09 15:15
Severity ?
3.7 (Low) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
Summary
curl 7.63.0 to and including 7.75.0 includes vulnerability that allows a malicious HTTPS proxy to MITM a connection due to bad handling of TLS 1.3 session tickets. When using a HTTPS proxy and TLS 1.3, libcurl can confuse session tickets arriving from the HTTPS proxy but work as if they arrived from the remote server and then wrongly "short-cut" the host handshake. When confusing the tickets, a HTTPS proxy can trick libcurl to use the wrong session ticket resume for the host and thereby circumvent the server TLS certificate check and make a MITM attack to be possible to perform unnoticed. Note that such a malicious HTTPS proxy needs to provide a certificate that curl will accept for the MITMed server for an attack to work - unless curl has been told to ignore the server certificate check.
References
▶ | URL | Tags | |
---|---|---|---|
support@hackerone.com | https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf | Patch, Third Party Advisory | |
support@hackerone.com | https://curl.se/docs/CVE-2021-22890.html | Patch, Vendor Advisory | |
support@hackerone.com | https://hackerone.com/reports/1129529 | Exploit, Issue Tracking, Patch, Third Party Advisory | |
support@hackerone.com | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP/ | Mailing List, Third Party Advisory | |
support@hackerone.com | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC/ | Mailing List, Third Party Advisory | |
support@hackerone.com | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ/ | Mailing List, Third Party Advisory | |
support@hackerone.com | https://security.gentoo.org/glsa/202105-36 | Third Party Advisory | |
support@hackerone.com | https://security.netapp.com/advisory/ntap-20210521-0007/ | Third Party Advisory | |
support@hackerone.com | https://www.oracle.com//security-alerts/cpujul2021.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://curl.se/docs/CVE-2021-22890.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://hackerone.com/reports/1129529 | Exploit, Issue Tracking, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP/ | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC/ | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ/ | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/202105-36 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20210521-0007/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com//security-alerts/cpujul2021.html | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
haxx | libcurl | * | |
fedoraproject | fedora | 32 | |
fedoraproject | fedora | 33 | |
fedoraproject | fedora | 34 | |
netapp | hci_management_node | - | |
netapp | solidfire | - | |
netapp | hci_storage_node | - | |
broadcom | fabric_operating_system | - | |
debian | debian_linux | 9.0 | |
siemens | sinec_infrastructure_network_services | * | |
oracle | communications_billing_and_revenue_management | 12.0.0.3.0 | |
oracle | essbase | 21.2 | |
splunk | universal_forwarder | * | |
splunk | universal_forwarder | * | |
splunk | universal_forwarder | 9.1.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*", "matchCriteriaId": "261AE6A4-223F-4131-BB3D-B97EDDBDA37A", "versionEndIncluding": "7.75.0", "versionStartIncluding": "7.63.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3C19813-E823-456A-B1CE-EC0684CE1953", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6E9EF0C-AFA8-4F7B-9FDC-1E0F7C26E737", "vulnerable": true }, { "criteria": "cpe:2.3:h:netapp:hci_storage_node:-:*:*:*:*:*:*:*", "matchCriteriaId": "02DEB4FB-A21D-4CB1-B522-EEE5093E8521", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:broadcom:fabric_operating_system:-:*:*:*:*:*:*:*", "matchCriteriaId": "046FB51E-B768-44D3-AEB5-D857145CA840", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*", "matchCriteriaId": "B0F46497-4AB0-49A7-9453-CC26837BF253", "versionEndExcluding": "1.0.1.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E39D442D-1997-49AF-8B02-5640BE2A26CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:essbase:21.2:*:*:*:*:*:*:*", "matchCriteriaId": "394A16F2-CCD4-44E5-BF6B-E0C782A9FA38", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:*", "matchCriteriaId": "5722E753-75DE-4944-A11B-556CB299B57D", "versionEndExcluding": "8.2.12", "versionStartIncluding": "8.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:*", "matchCriteriaId": "DC0F9351-81A4-4FEA-B6B5-6E960A933D32", "versionEndExcluding": "9.0.6", "versionStartIncluding": "9.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:splunk:universal_forwarder:9.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "EED24E67-2957-4C1B-8FEA-E2D2FE7B97FC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "curl 7.63.0 to and including 7.75.0 includes vulnerability that allows a malicious HTTPS proxy to MITM a connection due to bad handling of TLS 1.3 session tickets. When using a HTTPS proxy and TLS 1.3, libcurl can confuse session tickets arriving from the HTTPS proxy but work as if they arrived from the remote server and then wrongly \"short-cut\" the host handshake. When confusing the tickets, a HTTPS proxy can trick libcurl to use the wrong session ticket resume for the host and thereby circumvent the server TLS certificate check and make a MITM attack to be possible to perform unnoticed. Note that such a malicious HTTPS proxy needs to provide a certificate that curl will accept for the MITMed server for an attack to work - unless curl has been told to ignore the server certificate check." }, { "lang": "es", "value": "curl versiones 7.63.0 hasta 7.75.0 incluy\u00e9ndola, incluye una vulnerabilidad que permite que un proxy HTTPS malicioso acceda a una conexi\u00f3n MITM debido al manejo inapropiado de los tickets de sesi\u00f3n de TLS versi\u00f3n 1.3.\u0026#xa0;Cuando se usa un proxy HTTPS y TLS 1.3, libcurl puede confundir los tickets de sesi\u00f3n que llegan del proxy HTTPS pero funciona como si llegaran del servidor remoto y luego \"short-cut\" incorrectamente el protocolo de enlace del host.\u0026#xa0;Al confundir los tickets, un proxy HTTPS puede enga\u00f1ar a libcurl para que utilice la reanudaci\u00f3n del ticket de sesi\u00f3n incorrecta para el host y, por lo tanto, omitir la verificaci\u00f3n del certificado TLS del servidor y hacer que un ataque MITM sea posible de realizar sin ser detectado.\u0026#xa0;Tome en cuenta que dicho proxy HTTPS malicioso debe proporcionar un certificado que curl aceptar\u00e1 para el servidor MITMed para que funcione un ataque, a menos que se le haya dicho a curl que ignore la verificaci\u00f3n del certificado del servidor." } ], "id": "CVE-2021-22890", "lastModified": "2025-06-09T15:15:24.177", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2021-04-01T18:15:12.917", "references": [ { "source": "support@hackerone.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "source": "support@hackerone.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://curl.se/docs/CVE-2021-22890.html" }, { "source": "support@hackerone.com", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://hackerone.com/reports/1129529" }, { "source": "support@hackerone.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP/" }, { "source": "support@hackerone.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC/" }, { "source": "support@hackerone.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ/" }, { "source": "support@hackerone.com", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202105-36" }, { "source": "support@hackerone.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210521-0007/" }, { "source": "support@hackerone.com", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://curl.se/docs/CVE-2021-22890.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://hackerone.com/reports/1129529" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202105-36" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210521-0007/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" } ], "sourceIdentifier": "support@hackerone.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-300" } ], "source": "support@hackerone.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-290" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-12-14 20:15
Modified
2024-11-21 05:38
Severity ?
Summary
curl 7.41.0 through 7.73.0 is vulnerable to an improper check for certificate revocation due to insufficient verification of the OCSP response.
References
▶ | URL | Tags | |
---|---|---|---|
support@hackerone.com | http://seclists.org/fulldisclosure/2021/Apr/50 | Mailing List, Third Party Advisory | |
support@hackerone.com | http://seclists.org/fulldisclosure/2021/Apr/51 | Mailing List, Third Party Advisory | |
support@hackerone.com | http://seclists.org/fulldisclosure/2021/Apr/54 | Mailing List, Third Party Advisory | |
support@hackerone.com | https://cert-portal.siemens.com/productcert/pdf/ssa-200951.pdf | Third Party Advisory | |
support@hackerone.com | https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf | Patch, Third Party Advisory | |
support@hackerone.com | https://curl.se/docs/CVE-2020-8286.html | Vendor Advisory | |
support@hackerone.com | https://hackerone.com/reports/1048457 | Exploit, Patch, Third Party Advisory | |
support@hackerone.com | https://lists.debian.org/debian-lts-announce/2020/12/msg00029.html | Mailing List, Third Party Advisory | |
support@hackerone.com | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL/ | Mailing List, Third Party Advisory | |
support@hackerone.com | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG/ | Mailing List, Third Party Advisory | |
support@hackerone.com | https://security.gentoo.org/glsa/202012-14 | Third Party Advisory | |
support@hackerone.com | https://security.netapp.com/advisory/ntap-20210122-0007/ | Third Party Advisory | |
support@hackerone.com | https://support.apple.com/kb/HT212325 | Third Party Advisory | |
support@hackerone.com | https://support.apple.com/kb/HT212326 | Third Party Advisory | |
support@hackerone.com | https://support.apple.com/kb/HT212327 | Third Party Advisory | |
support@hackerone.com | https://www.debian.org/security/2021/dsa-4881 | Third Party Advisory | |
support@hackerone.com | https://www.oracle.com//security-alerts/cpujul2021.html | Third Party Advisory | |
support@hackerone.com | https://www.oracle.com/security-alerts/cpuApr2021.html | Third Party Advisory | |
support@hackerone.com | https://www.oracle.com/security-alerts/cpuapr2022.html | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2021/Apr/50 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2021/Apr/51 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2021/Apr/54 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-200951.pdf | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://curl.se/docs/CVE-2020-8286.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://hackerone.com/reports/1048457 | Exploit, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2020/12/msg00029.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL/ | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG/ | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/202012-14 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20210122-0007/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT212325 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT212326 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT212327 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2021/dsa-4881 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com//security-alerts/cpujul2021.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/security-alerts/cpuApr2021.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/security-alerts/cpuapr2022.html | Patch, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
haxx | libcurl | * | |
fedoraproject | fedora | 32 | |
fedoraproject | fedora | 33 | |
debian | debian_linux | 9.0 | |
debian | debian_linux | 10.0 | |
netapp | clustered_data_ontap | - | |
netapp | hci_management_node | - | |
netapp | solidfire | - | |
netapp | hci_bootstrap_os | - | |
netapp | hci_compute_node | - | |
netapp | hci_storage_node_firmware | - | |
netapp | hci_storage_node | - | |
apple | mac_os_x | * | |
apple | mac_os_x | * | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.15.7 | |
apple | mac_os_x | 10.15.7 | |
apple | mac_os_x | 10.15.7 | |
apple | mac_os_x | 10.15.7 | |
apple | macos | * | |
siemens | simatic_tim_1531_irc_firmware | * | |
siemens | simatic_tim_1531_irc | - | |
siemens | sinec_infrastructure_network_services | * | |
oracle | communications_billing_and_revenue_management | 12.0.0.3.0 | |
oracle | communications_cloud_native_core_policy | 1.14.0 | |
oracle | essbase | 21.2 | |
oracle | peoplesoft_enterprise_peopletools | 8.58 | |
splunk | universal_forwarder | * | |
splunk | universal_forwarder | * | |
splunk | universal_forwarder | 9.1.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*", "matchCriteriaId": "9A702C04-FA3B-4A88-8354-D7683A3329C1", "versionEndExcluding": "7.74.0", "versionStartIncluding": "7.41.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*", "matchCriteriaId": "1FE996B1-6951-4F85-AA58-B99A379D2163", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3C19813-E823-456A-B1CE-EC0684CE1953", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6E9EF0C-AFA8-4F7B-9FDC-1E0F7C26E737", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:hci_bootstrap_os:-:*:*:*:*:*:*:*", "matchCriteriaId": "1C767AA1-88B7-48F0-9F31-A89D16DCD52C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD7447BC-F315-4298-A822-549942FC118B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:hci_storage_node_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4BC4299D-05D3-4875-BC79-C3DC02C88ECE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:hci_storage_node:-:*:*:*:*:*:*:*", "matchCriteriaId": "02DEB4FB-A21D-4CB1-B522-EEE5093E8521", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "B0E97851-4DFF-4852-A339-183331F4ACBC", "versionEndExcluding": "10.14.6", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "DB8A73F8-3074-4B32-B9F6-343B6B1988C5", "versionEndExcluding": "10.15.7", "versionStartIncluding": "10.15", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:-:*:*:*:*:*:*", "matchCriteriaId": "693E7DAE-BBF0-4D48-9F8A-20DDBD4AAC0C", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-001:*:*:*:*:*:*", "matchCriteriaId": "CFE26ECC-A2C2-4501-9950-510DE0E1BD86", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-002:*:*:*:*:*:*", "matchCriteriaId": "26108BEF-0847-4AB0-BD98-35344DFA7835", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-001:*:*:*:*:*:*", "matchCriteriaId": "0FD3467D-7679-479F-9C0B-A93F7CD0929D", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-002:*:*:*:*:*:*", "matchCriteriaId": "D4C6098E-EDBD-4A85-8282-B2E9D9333872", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-003:*:*:*:*:*:*", "matchCriteriaId": "518BB47B-DD76-4E8C-9F10-7EBC1E146191", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-004:*:*:*:*:*:*", "matchCriteriaId": "63940A55-D851-46EB-9668-D82BEFC1FE95", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-005:*:*:*:*:*:*", "matchCriteriaId": "68C7A97A-3801-44FA-96CA-10298FA39883", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-006:*:*:*:*:*:*", "matchCriteriaId": "6D69914D-46C7-4A0E-A075-C863C1692D33", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-007:*:*:*:*:*:*", "matchCriteriaId": "9CDB4476-B521-43E4-A129-8718A8E0A8CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-001:*:*:*:*:*:*", "matchCriteriaId": "9D072B77-BE3F-4A2E-B66A-E2C8DC3781E4", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*", "matchCriteriaId": "A654B8A2-FC30-4171-B0BB-366CD7ED4B6A", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*", "matchCriteriaId": "F1F4BF7F-90D4-4668-B4E6-B06F4070F448", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*", "matchCriteriaId": "0F441A43-1669-478D-9EC8-E96882DE4F9F", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*", "matchCriteriaId": "C1C795B9-E58D-467C-83A8-2D45C792292F", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "matchCriteriaId": "4E699CCC-31F5-458E-A59C-79B3AF143747", "versionEndExcluding": "11.3", "versionStartIncluding": "11.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_tim_1531_irc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0BF5425F-6AC5-496F-B8BD-1C0BF5D04D1F", "versionEndIncluding": "2.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_tim_1531_irc:-:*:*:*:*:*:*:*", "matchCriteriaId": "AEFDF765-44F4-45CB-8A28-FD7D355310DA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*", "matchCriteriaId": "B0F46497-4AB0-49A7-9453-CC26837BF253", "versionEndExcluding": "1.0.1.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E39D442D-1997-49AF-8B02-5640BE2A26CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.14.0:*:*:*:*:*:*:*", "matchCriteriaId": "4479F76A-4B67-41CC-98C7-C76B81050F8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:essbase:21.2:*:*:*:*:*:*:*", "matchCriteriaId": "394A16F2-CCD4-44E5-BF6B-E0C782A9FA38", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*", "matchCriteriaId": "D9DB4A14-2EF5-4B54-95D2-75E6CF9AA0A9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:*", "matchCriteriaId": "5722E753-75DE-4944-A11B-556CB299B57D", "versionEndExcluding": "8.2.12", "versionStartIncluding": "8.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:*", "matchCriteriaId": "DC0F9351-81A4-4FEA-B6B5-6E960A933D32", "versionEndExcluding": "9.0.6", "versionStartIncluding": "9.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:splunk:universal_forwarder:9.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "EED24E67-2957-4C1B-8FEA-E2D2FE7B97FC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "curl 7.41.0 through 7.73.0 is vulnerable to an improper check for certificate revocation due to insufficient verification of the OCSP response." }, { "lang": "es", "value": "curl versiones 7.41.0 hasta 7.73.0, es vulnerable a una comprobaci\u00f3n inapropiada para la revocaci\u00f3n del certificado debido a una verificaci\u00f3n insuficiente de la respuesta OCSP" } ], "id": "CVE-2020-8286", "lastModified": "2024-11-21T05:38:39.643", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-12-14T20:15:14.043", "references": [ { "source": "support@hackerone.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/Apr/50" }, { "source": "support@hackerone.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/Apr/51" }, { "source": "support@hackerone.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/Apr/54" }, { "source": "support@hackerone.com", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-200951.pdf" }, { "source": "support@hackerone.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "source": "support@hackerone.com", "tags": [ "Vendor Advisory" ], "url": "https://curl.se/docs/CVE-2020-8286.html" }, { "source": "support@hackerone.com", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://hackerone.com/reports/1048457" }, { "source": "support@hackerone.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00029.html" }, { "source": "support@hackerone.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL/" }, { "source": "support@hackerone.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG/" }, { "source": "support@hackerone.com", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202012-14" }, { "source": "support@hackerone.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210122-0007/" }, { "source": "support@hackerone.com", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212325" }, { "source": "support@hackerone.com", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212326" }, { "source": "support@hackerone.com", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212327" }, { "source": "support@hackerone.com", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4881" }, { "source": "support@hackerone.com", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "source": "support@hackerone.com", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "source": "support@hackerone.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/Apr/50" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/Apr/51" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/Apr/54" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-200951.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://curl.se/docs/CVE-2020-8286.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://hackerone.com/reports/1048457" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00029.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202012-14" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210122-0007/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212325" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212326" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212327" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4881" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "sourceIdentifier": "support@hackerone.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-295" } ], "source": "support@hackerone.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-295" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-04-15 14:55
Modified
2025-04-12 10:46
Severity ?
Summary
The default configuration in cURL and libcurl 7.10.6 before 7.36.0 re-uses (1) SCP, (2) SFTP, (3) POP3, (4) POP3S, (5) IMAP, (6) IMAPS, (7) SMTP, (8) SMTPS, (9) LDAP, and (10) LDAPS connections, which might allow context-dependent attackers to connect as other users via a request, a similar issue to CVE-2014-0015.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://curl.haxx.se/docs/adv_20140326A.html | Vendor Advisory | |
secalert@redhat.com | http://lists.opensuse.org/opensuse-updates/2014-04/msg00042.html | ||
secalert@redhat.com | http://seclists.org/fulldisclosure/2014/Dec/23 | ||
secalert@redhat.com | http://secunia.com/advisories/57836 | ||
secalert@redhat.com | http://secunia.com/advisories/57966 | ||
secalert@redhat.com | http://secunia.com/advisories/57968 | ||
secalert@redhat.com | http://secunia.com/advisories/58615 | ||
secalert@redhat.com | http://secunia.com/advisories/59458 | ||
secalert@redhat.com | http://www-01.ibm.com/support/docview.wss?uid=swg21675820 | ||
secalert@redhat.com | http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095862 | ||
secalert@redhat.com | http://www.debian.org/security/2014/dsa-2902 | ||
secalert@redhat.com | http://www.getchef.com/blog/2014/04/09/chef-server-11-0-12-release/ | ||
secalert@redhat.com | http://www.getchef.com/blog/2014/04/09/enterprise-chef-1-4-9-release/ | ||
secalert@redhat.com | http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/ | ||
secalert@redhat.com | http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html | ||
secalert@redhat.com | http://www.securityfocus.com/archive/1/534161/100/0/threaded | ||
secalert@redhat.com | http://www.ubuntu.com/usn/USN-2167-1 | ||
secalert@redhat.com | http://www.vmware.com/security/advisories/VMSA-2014-0012.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://curl.haxx.se/docs/adv_20140326A.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-updates/2014-04/msg00042.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2014/Dec/23 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/57836 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/57966 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/57968 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/58615 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/59458 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www-01.ibm.com/support/docview.wss?uid=swg21675820 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095862 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2014/dsa-2902 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.getchef.com/blog/2014/04/09/chef-server-11-0-12-release/ | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.getchef.com/blog/2014/04/09/enterprise-chef-1-4-9-release/ | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/ | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/534161/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-2167-1 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vmware.com/security/advisories/VMSA-2014-0012.html |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
haxx | curl | 7.10.6 | |
haxx | curl | 7.10.7 | |
haxx | curl | 7.10.8 | |
haxx | curl | 7.11.0 | |
haxx | curl | 7.11.1 | |
haxx | curl | 7.11.2 | |
haxx | curl | 7.12.0 | |
haxx | curl | 7.12.1 | |
haxx | curl | 7.12.2 | |
haxx | curl | 7.12.3 | |
haxx | curl | 7.13.0 | |
haxx | curl | 7.13.1 | |
haxx | curl | 7.13.2 | |
haxx | curl | 7.14.0 | |
haxx | curl | 7.14.1 | |
haxx | curl | 7.15.0 | |
haxx | curl | 7.15.1 | |
haxx | curl | 7.15.2 | |
haxx | curl | 7.15.3 | |
haxx | curl | 7.15.4 | |
haxx | curl | 7.15.5 | |
haxx | curl | 7.16.0 | |
haxx | curl | 7.16.1 | |
haxx | curl | 7.16.2 | |
haxx | curl | 7.16.3 | |
haxx | curl | 7.16.4 | |
haxx | curl | 7.17.0 | |
haxx | curl | 7.17.1 | |
haxx | curl | 7.18.0 | |
haxx | curl | 7.18.1 | |
haxx | curl | 7.18.2 | |
haxx | curl | 7.19.0 | |
haxx | curl | 7.19.1 | |
haxx | curl | 7.19.2 | |
haxx | curl | 7.19.3 | |
haxx | curl | 7.19.4 | |
haxx | curl | 7.19.5 | |
haxx | curl | 7.19.6 | |
haxx | curl | 7.19.7 | |
haxx | curl | 7.20.0 | |
haxx | curl | 7.20.1 | |
haxx | curl | 7.21.0 | |
haxx | curl | 7.21.1 | |
haxx | curl | 7.21.2 | |
haxx | curl | 7.21.3 | |
haxx | curl | 7.21.4 | |
haxx | curl | 7.21.5 | |
haxx | curl | 7.21.6 | |
haxx | curl | 7.21.7 | |
haxx | curl | 7.22.0 | |
haxx | curl | 7.23.0 | |
haxx | curl | 7.23.1 | |
haxx | curl | 7.24.0 | |
haxx | curl | 7.25.0 | |
haxx | curl | 7.26.0 | |
haxx | curl | 7.27.0 | |
haxx | curl | 7.28.0 | |
haxx | curl | 7.28.1 | |
haxx | curl | 7.29.0 | |
haxx | curl | 7.30.0 | |
haxx | curl | 7.31.0 | |
haxx | curl | 7.32.0 | |
haxx | curl | 7.33.0 | |
haxx | curl | 7.34.0 | |
haxx | curl | 7.35.0 | |
haxx | libcurl | 7.10.6 | |
haxx | libcurl | 7.10.7 | |
haxx | libcurl | 7.10.8 | |
haxx | libcurl | 7.11.0 | |
haxx | libcurl | 7.11.1 | |
haxx | libcurl | 7.11.2 | |
haxx | libcurl | 7.12.0 | |
haxx | libcurl | 7.12.1 | |
haxx | libcurl | 7.12.2 | |
haxx | libcurl | 7.12.3 | |
haxx | libcurl | 7.13.0 | |
haxx | libcurl | 7.13.1 | |
haxx | libcurl | 7.13.2 | |
haxx | libcurl | 7.14.0 | |
haxx | libcurl | 7.14.1 | |
haxx | libcurl | 7.15.0 | |
haxx | libcurl | 7.15.1 | |
haxx | libcurl | 7.15.2 | |
haxx | libcurl | 7.15.3 | |
haxx | libcurl | 7.15.4 | |
haxx | libcurl | 7.15.5 | |
haxx | libcurl | 7.16.0 | |
haxx | libcurl | 7.16.1 | |
haxx | libcurl | 7.16.2 | |
haxx | libcurl | 7.16.3 | |
haxx | libcurl | 7.16.4 | |
haxx | libcurl | 7.17.0 | |
haxx | libcurl | 7.17.1 | |
haxx | libcurl | 7.18.0 | |
haxx | libcurl | 7.18.1 | |
haxx | libcurl | 7.18.2 | |
haxx | libcurl | 7.19.0 | |
haxx | libcurl | 7.19.1 | |
haxx | libcurl | 7.19.2 | |
haxx | libcurl | 7.19.3 | |
haxx | libcurl | 7.19.4 | |
haxx | libcurl | 7.19.5 | |
haxx | libcurl | 7.19.6 | |
haxx | libcurl | 7.19.7 | |
haxx | libcurl | 7.20.0 | |
haxx | libcurl | 7.20.1 | |
haxx | libcurl | 7.21.0 | |
haxx | libcurl | 7.21.1 | |
haxx | libcurl | 7.21.2 | |
haxx | libcurl | 7.21.3 | |
haxx | libcurl | 7.21.4 | |
haxx | libcurl | 7.21.5 | |
haxx | libcurl | 7.21.6 | |
haxx | libcurl | 7.21.7 | |
haxx | libcurl | 7.22.0 | |
haxx | libcurl | 7.23.0 | |
haxx | libcurl | 7.23.1 | |
haxx | libcurl | 7.24.0 | |
haxx | libcurl | 7.25.0 | |
haxx | libcurl | 7.26.0 | |
haxx | libcurl | 7.27.0 | |
haxx | libcurl | 7.28.0 | |
haxx | libcurl | 7.28.1 | |
haxx | libcurl | 7.29.0 | |
haxx | libcurl | 7.30.0 | |
haxx | libcurl | 7.31.0 | |
haxx | libcurl | 7.32.0 | |
haxx | libcurl | 7.33.0 | |
haxx | libcurl | 7.34.0 | |
haxx | libcurl | 7.35.0 | |
debian | debian_linux | 7.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:haxx:curl:7.10.6:*:*:*:*:*:*:*", "matchCriteriaId": "5D65CDC0-580B-42B3-97E8-69BE44CDB68C", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.10.7:*:*:*:*:*:*:*", "matchCriteriaId": "01001EEA-AB99-4041-8188-38CEBE9C3031", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.10.8:*:*:*:*:*:*:*", "matchCriteriaId": "31DB0DA3-88B7-43ED-8102-CEBC28524CE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "87596B6A-A7B3-4256-9982-45D3B6E3E018", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "0045855F-A707-415A-AC12-6981B68B08E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.11.2:*:*:*:*:*:*:*", "matchCriteriaId": "B49807DC-0BDA-41F6-BB76-7C62328D245F", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "0A78B6B8-9F4B-46AC-BB04-7EBADC690CBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "EFE80B46-33F0-4338-AF37-9E7E31FC5E83", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.12.2:*:*:*:*:*:*:*", "matchCriteriaId": "DD38D8C6-9EEE-4160-9353-773943A560B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.12.3:*:*:*:*:*:*:*", "matchCriteriaId": "FD33549E-EFFB-466F-8B47-BE036D454693", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.13.0:*:*:*:*:*:*:*", "matchCriteriaId": "16BB71C8-3564-4E69-A2C3-E9AB1F9EF20C", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.13.1:*:*:*:*:*:*:*", "matchCriteriaId": "4966AA12-15DB-44E5-84AF-9D7AF4A52F86", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.13.2:*:*:*:*:*:*:*", "matchCriteriaId": "827B6C8A-59C4-4714-9406-5C8EB5073AB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.14.0:*:*:*:*:*:*:*", "matchCriteriaId": "93A11305-E4FF-473B-9415-AF1F0E7A27D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.14.1:*:*:*:*:*:*:*", "matchCriteriaId": "8444095B-AF8F-42B5-BD4D-9CBE9238E42D", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.15.0:*:*:*:*:*:*:*", "matchCriteriaId": "C22F23AE-02AB-42F0-AA16-D2F8C94E5DE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B33DE520-BD2A-4499-B1F8-1439AE16AB57", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.15.2:*:*:*:*:*:*:*", "matchCriteriaId": "041FCB20-E74F-4550-AC48-EE4E5875E118", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.15.3:*:*:*:*:*:*:*", "matchCriteriaId": "D16DBA5E-582F-4648-932E-8A1EFB7FE3D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.15.4:*:*:*:*:*:*:*", "matchCriteriaId": "A25323F4-7C67-4097-AD53-A6B9E6D96BA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.15.5:*:*:*:*:*:*:*", "matchCriteriaId": "36919682-F59E-4EC0-886C-AE967F636753", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.16.0:*:*:*:*:*:*:*", "matchCriteriaId": "B45AF234-3651-4367-BFEF-8766F66FB138", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.16.1:*:*:*:*:*:*:*", "matchCriteriaId": "E46A9126-A02E-44CD-885D-0956E0C87C2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.16.2:*:*:*:*:*:*:*", "matchCriteriaId": "91E9C756-7FE3-4197-8C18-99CD1F49B0D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.16.3:*:*:*:*:*:*:*", "matchCriteriaId": "88806B7D-5EFE-4F91-B115-732882D2C126", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.16.4:*:*:*:*:*:*:*", "matchCriteriaId": "5BB9E8AB-B3EC-4743-B39B-7325EEB17233", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.17.0:*:*:*:*:*:*:*", "matchCriteriaId": "5030FBB0-C95B-4ADE-BFC2-CCA37AAD019B", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.17.1:*:*:*:*:*:*:*", "matchCriteriaId": "5513618A-6770-4292-95D1-68F55D8343CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.18.0:*:*:*:*:*:*:*", "matchCriteriaId": "7494C01F-E9EC-406E-879A-B2045865E282", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.18.1:*:*:*:*:*:*:*", "matchCriteriaId": "7DD9F894-4576-4ED1-9F55-4C27ECE7E058", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.18.2:*:*:*:*:*:*:*", "matchCriteriaId": "49AFACAC-BBAF-469B-BF05-0478E987120F", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.19.0:*:*:*:*:*:*:*", "matchCriteriaId": "6A136E86-0697-4915-BC49-F570C776EDE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.19.1:*:*:*:*:*:*:*", "matchCriteriaId": "ECB241AF-A01D-4FD6-B98A-F4C20F844C2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.19.2:*:*:*:*:*:*:*", "matchCriteriaId": "C5B61901-F7DF-4805-8EB7-CA1701CA81CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.19.3:*:*:*:*:*:*:*", "matchCriteriaId": "EB0CDEC9-224A-4668-B2E4-2145653E3F2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.19.4:*:*:*:*:*:*:*", "matchCriteriaId": "E92BE9CB-F001-47A0-94E0-48FC01A63FE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.19.5:*:*:*:*:*:*:*", "matchCriteriaId": "324E2A20-2F66-4E03-9A7F-A09E631E9033", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.19.6:*:*:*:*:*:*:*", "matchCriteriaId": "C8987B53-BD80-40B9-8429-21AD97208040", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.19.7:*:*:*:*:*:*:*", "matchCriteriaId": "490D1BDC-33B9-43BA-B6DA-42DEE577082A", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "B465BE7E-0B4D-4BC4-894B-3F51A201CE91", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.20.1:*:*:*:*:*:*:*", "matchCriteriaId": "CAA17087-3021-4961-B53C-CDCC872A31A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.21.0:*:*:*:*:*:*:*", "matchCriteriaId": "E5CA3936-4602-40E6-B75C-58D3F24268E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.21.1:*:*:*:*:*:*:*", "matchCriteriaId": "D87C110C-21DD-438A-90EF-BE516CF59F3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.21.2:*:*:*:*:*:*:*", "matchCriteriaId": "AD2D9E0E-2EED-4FB5-859C-05226FC48D7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.21.3:*:*:*:*:*:*:*", "matchCriteriaId": "7CA01E21-71CE-4B07-B5A6-D0D7AC493A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.21.4:*:*:*:*:*:*:*", "matchCriteriaId": "51239254-31CE-4BF7-8669-1525BA391362", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.21.5:*:*:*:*:*:*:*", "matchCriteriaId": "2E2BE20D-232D-4C86-81B0-C82CCC1CAA62", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.21.6:*:*:*:*:*:*:*", "matchCriteriaId": "D652FD7C-1521-4391-AAE1-0A4D6F4CE8F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.21.7:*:*:*:*:*:*:*", "matchCriteriaId": "DB861143-F809-45CF-95BE-E64F4BA1A0DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.22.0:*:*:*:*:*:*:*", "matchCriteriaId": "E3480F4A-0AE0-4428-9EDA-5A6B994909A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.23.0:*:*:*:*:*:*:*", "matchCriteriaId": "936BF59E-33A8-46BA-9FBD-8763812E2F10", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.23.1:*:*:*:*:*:*:*", "matchCriteriaId": "33168C81-6DAE-40D6-9693-68390CD71DA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.24.0:*:*:*:*:*:*:*", "matchCriteriaId": "424F9604-AA9A-4D45-A521-0BDEDB723659", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.25.0:*:*:*:*:*:*:*", "matchCriteriaId": "DC6EBCEB-E52C-4FF5-B15A-6960F58090EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.26.0:*:*:*:*:*:*:*", "matchCriteriaId": "D204E994-4591-403C-8EF3-D3B7BF4AA1A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.27.0:*:*:*:*:*:*:*", "matchCriteriaId": "EBF5418D-1162-4B1E-BC3D-06A3E084BEFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.28.0:*:*:*:*:*:*:*", "matchCriteriaId": "1CA65F31-3D54-4F66-A0A3-2BD993FF38F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.28.1:*:*:*:*:*:*:*", "matchCriteriaId": "41ACC9FE-62FF-424B-B4B8-B033FEAF7686", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.29.0:*:*:*:*:*:*:*", "matchCriteriaId": "F8BC39E9-5945-4DC8-ACA8-1C9918D9F279", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.30.0:*:*:*:*:*:*:*", "matchCriteriaId": "B9658447-FBB0-4DEA-8FEE-BD4D3D1BF7FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.31.0:*:*:*:*:*:*:*", "matchCriteriaId": "5ECABFCB-0D02-4B5B-BB35-C6B3C0896348", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.32.0:*:*:*:*:*:*:*", "matchCriteriaId": "5A5176F0-E62F-46FF-B536-DC0680696773", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.33.0:*:*:*:*:*:*:*", "matchCriteriaId": "506A3761-3D24-43DB-88D8-4EB5B9E8BA5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.34.0:*:*:*:*:*:*:*", "matchCriteriaId": "0B6EF8B0-0E86-449C-A500-ACD902A78C7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.35.0:*:*:*:*:*:*:*", "matchCriteriaId": "4D558CC2-0146-4887-834E-19FCB1D512A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.10.6:*:*:*:*:*:*:*", "matchCriteriaId": "2E1F9453-1FB6-4CA7-9285-A243E56667B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.10.7:*:*:*:*:*:*:*", "matchCriteriaId": "F79828BB-2412-46AD-BE3C-A51B48E191AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.10.8:*:*:*:*:*:*:*", "matchCriteriaId": "72D0F13F-D56F-4C1C-A3CF-2E4E704817CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "90A4F2E2-1B43-470E-8935-CB32F12A0124", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "797DF5C7-509E-48FD-BD04-C66E01748728", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.11.2:*:*:*:*:*:*:*", "matchCriteriaId": "47BD868A-CE3B-4E39-A588-C4EDA3265A71", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "4A2EE400-1C36-40F4-A9D1-9AB432F168BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "06E3CB14-FB16-4F4E-9AD9-A02DC727FF6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.12.2:*:*:*:*:*:*:*", "matchCriteriaId": "08DCC42C-C881-4AEA-9348-E8317C54D62B", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.12.3:*:*:*:*:*:*:*", "matchCriteriaId": "2BC4EF5A-C8CB-4F33-B4D1-E4192B179D26", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.13.0:*:*:*:*:*:*:*", "matchCriteriaId": "81CEF54A-9668-4031-926F-9B978DD5CDF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.13.1:*:*:*:*:*:*:*", "matchCriteriaId": "45068C90-8915-4D19-B36B-993980E28D08", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.13.2:*:*:*:*:*:*:*", "matchCriteriaId": "24543011-2458-47B5-984A-901E70084902", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.14.0:*:*:*:*:*:*:*", "matchCriteriaId": "FB482A9C-D577-4AEE-A08F-CAFA6586B51E", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.14.1:*:*:*:*:*:*:*", "matchCriteriaId": "65AF9B86-A555-4D5E-B24E-9EBF78BCD8CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.15.0:*:*:*:*:*:*:*", "matchCriteriaId": "60BBDF07-DB97-433E-B542-EFEBE45550DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.15.1:*:*:*:*:*:*:*", "matchCriteriaId": "CA8BE3F8-82ED-4DD7-991E-979E950C98B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.15.2:*:*:*:*:*:*:*", "matchCriteriaId": "738AA231-4694-46E8-B559-1594263A9987", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.15.3:*:*:*:*:*:*:*", "matchCriteriaId": "E9E1F171-B887-499A-BF4F-538EBF347811", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.15.4:*:*:*:*:*:*:*", "matchCriteriaId": "07AA276A-0EBA-4DC9-951C-8F8159FAC7A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.15.5:*:*:*:*:*:*:*", "matchCriteriaId": "8DEEF534-9AD2-4439-9D69-E91D062C4647", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.16.0:*:*:*:*:*:*:*", "matchCriteriaId": "63643BE1-C978-4CD2-8ED1-2B979DB0676E", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.16.1:*:*:*:*:*:*:*", "matchCriteriaId": "F6FA04A0-9258-4654-ABCF-F41340B1FA35", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.16.2:*:*:*:*:*:*:*", "matchCriteriaId": "DE829230-AFDB-4131-9C6A-D9D7A66C5B57", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.16.3:*:*:*:*:*:*:*", "matchCriteriaId": "B7E8BA30-8087-48D4-AE1B-48326FF826B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.16.4:*:*:*:*:*:*:*", "matchCriteriaId": "47970EFF-2F51-4875-A6BD-E30614E13278", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.17.0:*:*:*:*:*:*:*", "matchCriteriaId": "52C9B668-3204-41C5-A82E-262BDFA541DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*", "matchCriteriaId": "08C8EE1E-E186-42D6-8B12-05865C73F261", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*", "matchCriteriaId": "EEA3D88B-41B9-4D79-B47D-B3D6058C0C27", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.18.1:*:*:*:*:*:*:*", "matchCriteriaId": "C2C80901-D48E-4C2A-9BED-A40007A11C97", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*", "matchCriteriaId": "331A51E4-AA73-486F-9618-5A83965F2436", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.0:*:*:*:*:*:*:*", "matchCriteriaId": "EB32DF2C-9208-4853-ADEB-B00D764D7467", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.1:*:*:*:*:*:*:*", "matchCriteriaId": "E05636DC-7E38-4605-AAB8-81C0AE37520A", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.2:*:*:*:*:*:*:*", "matchCriteriaId": "624DF2F1-53FD-48D3-B93D-44E99C9C0C5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*", "matchCriteriaId": "F2171C7C-311A-4405-B95F-3A54966FA844", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.4:*:*:*:*:*:*:*", "matchCriteriaId": "5DE20A41-8B53-46FC-9002-69CC7495171F", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.5:*:*:*:*:*:*:*", "matchCriteriaId": "87ED9DA0-E880-4CBB-B1AC-5AEE8A004718", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.6:*:*:*:*:*:*:*", "matchCriteriaId": "5293C7F0-BF9F-4768-889A-876CE78903CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.7:*:*:*:*:*:*:*", "matchCriteriaId": "F3EB41B3-65F3-4B0E-8CCC-325B14AF605B", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "857B244C-2AFB-40C7-A893-7C6DE9871BCE", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.20.1:*:*:*:*:*:*:*", "matchCriteriaId": "B732CE55-820A-40E0-A885-71BBB6CF8C15", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.0:*:*:*:*:*:*:*", "matchCriteriaId": "0455A5F2-1515-4CD8-BA2F-74D28E91A661", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.1:*:*:*:*:*:*:*", "matchCriteriaId": "29034B3A-BE9D-4D68-8C56-4465C03C3693", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*", "matchCriteriaId": "6249538E-FBCB-4130-91FB-DA78D7BA45DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.3:*:*:*:*:*:*:*", "matchCriteriaId": "5E11B8A5-50A2-468F-BFB3-86DD9D28AC73", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.4:*:*:*:*:*:*:*", "matchCriteriaId": "9EAE25A0-3828-46F1-AB30-88732CBC9F38", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.5:*:*:*:*:*:*:*", "matchCriteriaId": "1533A85C-2160-445D-8787-E624AEDC5A0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.6:*:*:*:*:*:*:*", "matchCriteriaId": "D87B9393-7EA4-43DA-900C-7E840AE2D4C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.7:*:*:*:*:*:*:*", "matchCriteriaId": "7D1249E9-304F-4952-8DAB-8B79CE5E7D54", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*", "matchCriteriaId": "83FAF953-6A65-4FAB-BDB5-03B468CD1C9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*", "matchCriteriaId": "29F8FF1F-A639-4161-9366-62528AAF4C07", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.23.1:*:*:*:*:*:*:*", "matchCriteriaId": "812AB429-379A-4EDE-9664-5BC2989053F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.24.0:*:*:*:*:*:*:*", "matchCriteriaId": "13DD791F-C4BD-4456-955A-92E84082AA09", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.25.0:*:*:*:*:*:*:*", "matchCriteriaId": "4A17E442-45AA-4780-98B4-9BF764DCC1C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*", "matchCriteriaId": "F6AF544C-5F16-4434-B9FB-93B1B7318950", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*", "matchCriteriaId": "CBFD9ED9-2412-44AE-9C55-0ED03A121B23", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*", "matchCriteriaId": "67CCE31B-ABDA-4F32-BAF1-B1AD0664B3E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*", "matchCriteriaId": "9E66A332-ECD1-4452-B444-FB629022FDF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.29.0:*:*:*:*:*:*:*", "matchCriteriaId": "CDD3D599-35E9-4590-B5E0-3AF04D344695", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.30.0:*:*:*:*:*:*:*", "matchCriteriaId": "A3B6BFFB-7967-482C-9B49-4BD25C815299", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*", "matchCriteriaId": "1791BF6D-2C96-4A6E-90D4-2906A73601F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*", "matchCriteriaId": "260DD751-4145-4B75-B892-5FC932C6A305", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*", "matchCriteriaId": "EFF4AD0D-2EC5-4CE8-B6B3-2EC8ED2FF118", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*", "matchCriteriaId": "3EB1CB85-0A9B-4816-B471-278774EE6D4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*", "matchCriteriaId": "3831AB03-4E7E-476D-9623-58AADC188DFE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The default configuration in cURL and libcurl 7.10.6 before 7.36.0 re-uses (1) SCP, (2) SFTP, (3) POP3, (4) POP3S, (5) IMAP, (6) IMAPS, (7) SMTP, (8) SMTPS, (9) LDAP, and (10) LDAPS connections, which might allow context-dependent attackers to connect as other users via a request, a similar issue to CVE-2014-0015." }, { "lang": "es", "value": "La configuraci\u00f3n por defecto en cURL y libcurl 7.10.6 anterior a 7.36.0 re-utiliza conexiones (1) SCP, (2) SFTP, (3) POP3, (4) POP3S, (5) IMAP, (6) IMAPS, (7) SMTP, (8) SMTPS, (9) LDAP y (10) LDAPS, lo que podr\u00eda permitir a atacantes dependientes de contexto conectar como otro usuario a trav\u00e9s de una petici\u00f3n, un problema similar a CVE-2014-0015." } ], "id": "CVE-2014-0138", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-04-15T14:55:04.107", "references": [ { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://curl.haxx.se/docs/adv_20140326A.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-updates/2014-04/msg00042.html" }, { "source": "secalert@redhat.com", "url": "http://seclists.org/fulldisclosure/2014/Dec/23" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/57836" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/57966" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/57968" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/58615" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/59458" }, { "source": "secalert@redhat.com", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21675820" }, { "source": "secalert@redhat.com", "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095862" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2014/dsa-2902" }, { "source": "secalert@redhat.com", "url": "http://www.getchef.com/blog/2014/04/09/chef-server-11-0-12-release/" }, { "source": "secalert@redhat.com", "url": "http://www.getchef.com/blog/2014/04/09/enterprise-chef-1-4-9-release/" }, { "source": "secalert@redhat.com", "url": "http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/" }, { "source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/USN-2167-1" }, { "source": "secalert@redhat.com", "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://curl.haxx.se/docs/adv_20140326A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2014-04/msg00042.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2014/Dec/23" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/57836" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/57966" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/57968" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/58615" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/59458" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21675820" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095862" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2014/dsa-2902" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.getchef.com/blog/2014/04/09/chef-server-11-0-12-release/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.getchef.com/blog/2014/04/09/enterprise-chef-1-4-9-release/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-2167-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-05-28 19:29
Modified
2024-11-21 04:44
Severity ?
Summary
A heap buffer overflow in the TFTP receiving code allows for DoS or arbitrary code execution in libcurl versions 7.19.4 through 7.64.1.
References
▶ | URL | Tags | |
---|---|---|---|
support@hackerone.com | http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00008.html | Mailing List, Third Party Advisory | |
support@hackerone.com | http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00017.html | Mailing List, Third Party Advisory | |
support@hackerone.com | http://www.openwall.com/lists/oss-security/2019/09/11/6 | Mailing List, Patch, Third Party Advisory | |
support@hackerone.com | https://curl.haxx.se/docs/CVE-2019-5436.html | Exploit, Patch, Vendor Advisory | |
support@hackerone.com | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SMG3V4VTX2SE3EW3HQTN3DDLQBTORQC2/ | ||
support@hackerone.com | https://seclists.org/bugtraq/2020/Feb/36 | Mailing List, Third Party Advisory | |
support@hackerone.com | https://security.gentoo.org/glsa/202003-29 | Third Party Advisory | |
support@hackerone.com | https://security.netapp.com/advisory/ntap-20190606-0004/ | Third Party Advisory | |
support@hackerone.com | https://support.f5.com/csp/article/K55133295 | Third Party Advisory | |
support@hackerone.com | https://support.f5.com/csp/article/K55133295?utm_source=f5support&%3Butm_medium=RSS | ||
support@hackerone.com | https://www.debian.org/security/2020/dsa-4633 | Third Party Advisory | |
support@hackerone.com | https://www.oracle.com/security-alerts/cpuapr2020.html | Third Party Advisory | |
support@hackerone.com | https://www.oracle.com/security-alerts/cpuoct2020.html | ||
support@hackerone.com | https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00008.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00017.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2019/09/11/6 | Mailing List, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://curl.haxx.se/docs/CVE-2019-5436.html | Exploit, Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SMG3V4VTX2SE3EW3HQTN3DDLQBTORQC2/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://seclists.org/bugtraq/2020/Feb/36 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/202003-29 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20190606-0004/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.f5.com/csp/article/K55133295 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.f5.com/csp/article/K55133295?utm_source=f5support&%3Butm_medium=RSS | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2020/dsa-4633 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/security-alerts/cpuapr2020.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/security-alerts/cpuoct2020.html | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html | Patch, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
haxx | libcurl | * | |
opensuse | leap | 15.0 | |
opensuse | leap | 15.1 | |
opensuse | leap | 42.3 | |
fedoraproject | fedora | 29 | |
debian | debian_linux | 9.0 | |
debian | debian_linux | 10.0 | |
f5 | traffix_signaling_delivery_controller | * | |
netapp | hci_management_node | - | |
netapp | solidfire | - | |
netapp | steelstore_cloud_integrated_storage | - | |
oracle | enterprise_manager_ops_center | 12.3.3 | |
oracle | enterprise_manager_ops_center | 12.4.0 | |
oracle | mysql_server | * | |
oracle | mysql_server | * | |
oracle | oss_support_tools | 20.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*", "matchCriteriaId": "18D5BEE8-2C04-4882-9C6D-754C0373E924", "versionEndIncluding": "7.64.1", "versionStartIncluding": "7.19.4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "matchCriteriaId": "F1E78106-58E6-4D59-990F-75DA575BFAD9", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*", "matchCriteriaId": "5F65DAB0-3DAD-49FF-BC73-3581CC3D5BF3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", "matchCriteriaId": "D100F7CE-FC64-4CC6-852A-6136D72DA419", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:traffix_signaling_delivery_controller:*:*:*:*:*:*:*:*", "matchCriteriaId": "4E52F91D-3F39-4D89-8069-EC422FB1F700", "versionEndIncluding": "5.1.0", "versionStartIncluding": "5.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3C19813-E823-456A-B1CE-EC0684CE1953", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6E9EF0C-AFA8-4F7B-9FDC-1E0F7C26E737", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*", "matchCriteriaId": "E94F7F59-1785-493F-91A7-5F5EA5E87E4D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "AB654DFA-FEF9-4D00-ADB0-F3F2B6ACF13E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "37209C6F-EF99-4D21-9608-B3A06D283D24", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "E9963770-142A-4D06-9D50-E137795A96DA", "versionEndIncluding": "5.7.27", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "706073CA-6C46-4480-9C4B-4DB9B1B9F4EB", "versionEndIncluding": "8.0.17", "versionStartIncluding": "5.7.28", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:oss_support_tools:20.0:*:*:*:*:*:*:*", "matchCriteriaId": "8252A7F5-2FB5-4E73-864D-D11F21F5EC56", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A heap buffer overflow in the TFTP receiving code allows for DoS or arbitrary code execution in libcurl versions 7.19.4 through 7.64.1." }, { "lang": "es", "value": "Un desbordamiento de b\u00fafer en la memoria din\u00e1mica (heap) del c\u00f3digo de recepci\u00f3n TFTP, permite la ejecuci\u00f3n de c\u00f3digo arbitrario o una Denegaci\u00f3n de Servicio (DoS) en las versiones de libcurl 7.19.4 hasta 7.64.1." } ], "id": "CVE-2019-5436", "lastModified": "2024-11-21T04:44:55.937", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-05-28T19:29:06.127", "references": [ { "source": "support@hackerone.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00008.html" }, { "source": "support@hackerone.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00017.html" }, { "source": "support@hackerone.com", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2019/09/11/6" }, { "source": "support@hackerone.com", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "https://curl.haxx.se/docs/CVE-2019-5436.html" }, { "source": "support@hackerone.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SMG3V4VTX2SE3EW3HQTN3DDLQBTORQC2/" }, { "source": "support@hackerone.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/bugtraq/2020/Feb/36" }, { "source": "support@hackerone.com", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202003-29" }, { "source": "support@hackerone.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20190606-0004/" }, { "source": "support@hackerone.com", "tags": [ "Third Party Advisory" ], "url": "https://support.f5.com/csp/article/K55133295" }, { "source": "support@hackerone.com", "url": "https://support.f5.com/csp/article/K55133295?utm_source=f5support\u0026amp%3Butm_medium=RSS" }, { "source": "support@hackerone.com", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2020/dsa-4633" }, { "source": "support@hackerone.com", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "source": "support@hackerone.com", "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "source": "support@hackerone.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00008.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00017.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2019/09/11/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "https://curl.haxx.se/docs/CVE-2019-5436.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SMG3V4VTX2SE3EW3HQTN3DDLQBTORQC2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/bugtraq/2020/Feb/36" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202003-29" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20190606-0004/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.f5.com/csp/article/K55133295" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.f5.com/csp/article/K55133295?utm_source=f5support\u0026amp%3Butm_medium=RSS" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2020/dsa-4633" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" } ], "sourceIdentifier": "support@hackerone.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-122" } ], "source": "support@hackerone.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-01-15 15:59
Modified
2025-04-12 10:46
Severity ?
Summary
CRLF injection vulnerability in libcurl 6.0 through 7.x before 7.40.0, when using an HTTP proxy, allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via CRLF sequences in a URL.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://advisories.mageia.org/MGASA-2015-0020.html | ||
secalert@redhat.com | http://curl.haxx.se/docs/adv_20150108B.html | Vendor Advisory | |
secalert@redhat.com | http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743 | ||
secalert@redhat.com | http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html | ||
secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147856.html | ||
secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147876.html | ||
secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156945.html | ||
secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157188.html | ||
secalert@redhat.com | http://lists.opensuse.org/opensuse-updates/2015-02/msg00040.html | ||
secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2015-1254.html | ||
secalert@redhat.com | http://secunia.com/advisories/61925 | ||
secalert@redhat.com | http://secunia.com/advisories/62075 | ||
secalert@redhat.com | http://secunia.com/advisories/62361 | ||
secalert@redhat.com | http://www.debian.org/security/2015/dsa-3122 | ||
secalert@redhat.com | http://www.mandriva.com/security/advisories?name=MDVSA-2015:021 | ||
secalert@redhat.com | http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html | ||
secalert@redhat.com | http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html | ||
secalert@redhat.com | http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html | ||
secalert@redhat.com | http://www.securityfocus.com/bid/71964 | ||
secalert@redhat.com | http://www.securitytracker.com/id/1032768 | ||
secalert@redhat.com | http://www.ubuntu.com/usn/USN-2474-1 | ||
secalert@redhat.com | https://kc.mcafee.com/corporate/index?page=content&id=SB10131 | ||
secalert@redhat.com | https://security.gentoo.org/glsa/201701-47 | ||
secalert@redhat.com | https://support.apple.com/kb/HT205031 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://advisories.mageia.org/MGASA-2015-0020.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://curl.haxx.se/docs/adv_20150108B.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147856.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147876.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156945.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157188.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-updates/2015-02/msg00040.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2015-1254.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/61925 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/62075 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/62361 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2015/dsa-3122 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2015:021 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/71964 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1032768 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-2474-1 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://kc.mcafee.com/corporate/index?page=content&id=SB10131 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/201701-47 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT205031 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
debian | debian_linux | 7.0 | |
haxx | libcurl | 6.0 | |
haxx | libcurl | 6.1 | |
haxx | libcurl | 6.1 | |
haxx | libcurl | 6.2 | |
haxx | libcurl | 6.3 | |
haxx | libcurl | 6.3.1 | |
haxx | libcurl | 6.4 | |
haxx | libcurl | 6.5 | |
haxx | libcurl | 6.5.1 | |
haxx | libcurl | 6.5.2 | |
haxx | libcurl | 7.1 | |
haxx | libcurl | 7.1.1 | |
haxx | libcurl | 7.2 | |
haxx | libcurl | 7.2.1 | |
haxx | libcurl | 7.3 | |
haxx | libcurl | 7.4 | |
haxx | libcurl | 7.4.1 | |
haxx | libcurl | 7.4.2 | |
haxx | libcurl | 7.5 | |
haxx | libcurl | 7.5.1 | |
haxx | libcurl | 7.5.2 | |
haxx | libcurl | 7.6 | |
haxx | libcurl | 7.6.1 | |
haxx | libcurl | 7.7 | |
haxx | libcurl | 7.7.1 | |
haxx | libcurl | 7.7.2 | |
haxx | libcurl | 7.7.3 | |
haxx | libcurl | 7.8 | |
haxx | libcurl | 7.8.1 | |
haxx | libcurl | 7.9 | |
haxx | libcurl | 7.9.1 | |
haxx | libcurl | 7.9.2 | |
haxx | libcurl | 7.9.3 | |
haxx | libcurl | 7.9.4 | |
haxx | libcurl | 7.9.5 | |
haxx | libcurl | 7.9.6 | |
haxx | libcurl | 7.9.7 | |
haxx | libcurl | 7.9.8 | |
haxx | libcurl | 7.10 | |
haxx | libcurl | 7.10.1 | |
haxx | libcurl | 7.10.2 | |
haxx | libcurl | 7.10.3 | |
haxx | libcurl | 7.10.4 | |
haxx | libcurl | 7.10.5 | |
haxx | libcurl | 7.10.6 | |
haxx | libcurl | 7.10.7 | |
haxx | libcurl | 7.10.8 | |
haxx | libcurl | 7.11.0 | |
haxx | libcurl | 7.11.1 | |
haxx | libcurl | 7.11.2 | |
haxx | libcurl | 7.12.0 | |
haxx | libcurl | 7.12.1 | |
haxx | libcurl | 7.12.2 | |
haxx | libcurl | 7.12.3 | |
haxx | libcurl | 7.13.0 | |
haxx | libcurl | 7.13.1 | |
haxx | libcurl | 7.13.2 | |
haxx | libcurl | 7.14.0 | |
haxx | libcurl | 7.14.1 | |
haxx | libcurl | 7.15.0 | |
haxx | libcurl | 7.15.1 | |
haxx | libcurl | 7.15.2 | |
haxx | libcurl | 7.15.3 | |
haxx | libcurl | 7.15.4 | |
haxx | libcurl | 7.15.5 | |
haxx | libcurl | 7.16.0 | |
haxx | libcurl | 7.16.1 | |
haxx | libcurl | 7.16.2 | |
haxx | libcurl | 7.16.3 | |
haxx | libcurl | 7.16.4 | |
haxx | libcurl | 7.17.0 | |
haxx | libcurl | 7.17.1 | |
haxx | libcurl | 7.18.0 | |
haxx | libcurl | 7.18.1 | |
haxx | libcurl | 7.18.2 | |
haxx | libcurl | 7.19.0 | |
haxx | libcurl | 7.19.1 | |
haxx | libcurl | 7.19.2 | |
haxx | libcurl | 7.19.3 | |
haxx | libcurl | 7.19.4 | |
haxx | libcurl | 7.19.5 | |
haxx | libcurl | 7.19.6 | |
haxx | libcurl | 7.19.7 | |
haxx | libcurl | 7.20.0 | |
haxx | libcurl | 7.20.1 | |
haxx | libcurl | 7.21.0 | |
haxx | libcurl | 7.21.1 | |
haxx | libcurl | 7.21.2 | |
haxx | libcurl | 7.21.3 | |
haxx | libcurl | 7.21.4 | |
haxx | libcurl | 7.21.5 | |
haxx | libcurl | 7.21.6 | |
haxx | libcurl | 7.21.7 | |
haxx | libcurl | 7.22.0 | |
haxx | libcurl | 7.23.0 | |
haxx | libcurl | 7.23.1 | |
haxx | libcurl | 7.24.0 | |
haxx | libcurl | 7.25.0 | |
haxx | libcurl | 7.26.0 | |
haxx | libcurl | 7.27.0 | |
haxx | libcurl | 7.28.0 | |
haxx | libcurl | 7.28.1 | |
haxx | libcurl | 7.29.0 | |
haxx | libcurl | 7.30.0 | |
haxx | libcurl | 7.31.0 | |
haxx | libcurl | 7.32.0 | |
haxx | libcurl | 7.33.0 | |
haxx | libcurl | 7.34.0 | |
haxx | libcurl | 7.35.0 | |
haxx | libcurl | 7.36.0 | |
haxx | libcurl | 7.37.0 | |
haxx | libcurl | 7.37.1 | |
haxx | libcurl | 7.38.0 | |
haxx | libcurl | 7.39 | |
canonical | ubuntu_linux | 10.04 | |
canonical | ubuntu_linux | 12.04 | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 14.10 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:haxx:libcurl:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "9A8977E9-178B-4420-AB2E-BD78CEFF5AC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:6.1:*:*:*:*:*:*:*", "matchCriteriaId": "C81D84BB-063A-4481-BAE0-916ED0D45A55", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:6.1:beta:*:*:*:*:*:*", "matchCriteriaId": "11807523-326F-4CEE-B5B0-8452A8F547F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:6.2:*:*:*:*:*:*:*", "matchCriteriaId": "1BB7192D-C347-495D-A0E2-FC89F21BEF9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:6.3:*:*:*:*:*:*:*", "matchCriteriaId": "D8D9E872-78E5-4078-B44C-1F1DDBEA9FBB", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:6.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "A8382D7A-21B0-4F91-8B01-F7155A61A432", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:6.4:*:*:*:*:*:*:*", "matchCriteriaId": "85E53AA4-44DB-4A7F-AE86-E0556357C14F", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:6.5:*:*:*:*:*:*:*", "matchCriteriaId": "68E6FA39-BB3E-42EB-B6D6-F8EEBC80BEAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:6.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "5A7CEE1D-1F74-4CAF-9C2E-173D74EE4427", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:6.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "BF24F8C7-6A85-49EA-9BA8-A775B048D98A", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "9D2115A8-11C4-4B59-85CA-B1F105EBD43F", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "CE786C2D-686F-4DD5-838A-C2B6DD76368C", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.2:*:*:*:*:*:*:*", "matchCriteriaId": "C27E5503-BBE7-440B-B08F-352BC0D61D61", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "E4917E4B-9E96-4EE4-8167-16C4B8111ACE", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.3:*:*:*:*:*:*:*", "matchCriteriaId": "D328A0E8-D462-403C-8D70-6438D823694C", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.4:*:*:*:*:*:*:*", "matchCriteriaId": "907EFA38-22D0-4BB4-B792-8BD16B0099A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "7E865E7A-51F1-46B1-9F63-28927570668E", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "9FC9C909-A96E-43E5-957B-8A3A946B7C4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.5:*:*:*:*:*:*:*", "matchCriteriaId": "6E1DCBB5-11B7-4EE2-AC6D-DC822D094102", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "E579082A-DB23-44B7-80B2-92FB29321335", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "79EECAA6-3074-4771-9C77-F07A40D804F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.6:*:*:*:*:*:*:*", "matchCriteriaId": "03814F3E-08E6-42B6-BA88-A11C8781CC0B", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "24459498-0A74-4402-A670-30F60FDFB885", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.7:*:*:*:*:*:*:*", "matchCriteriaId": "FB30E8CE-57AD-4225-8BC1-0C496A8A3D8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "F884BEE7-8AD7-4C39-B955-85578ADA7E5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "9C70D1DF-E117-409F-A4DE-8602AFCF9F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "E546224C-AA58-4025-B921-8D5ED1365FD2", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.8:*:*:*:*:*:*:*", "matchCriteriaId": "8360A6AE-9735-4019-9A24-A5045D528455", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "21EDD6A3-9D85-4E54-96BB-3A8055EB286C", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.9:*:*:*:*:*:*:*", "matchCriteriaId": "BE48C5C5-DF42-495D-A5A7-D189AE873CF6", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "CF611F14-AC9A-4D7E-BF95-2D00D880C40B", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "C378EDAB-0D0C-4A63-B230-0DC8EB74C5A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "A6D6717E-CB09-493D-AD86-7D5C7782CE12", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "6AF87C3C-1AF9-4015-A794-C160AD3128D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "4CDAFF2D-1F8C-45CD-BADC-8CBCEC27A8CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "F7EDAFA2-030E-438B-B83A-CF78A409D382", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "6CE2A761-2015-4E52-B284-02DC7ED03636", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "83BF3E1B-2F71-4142-A2A5-EA859D806094", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.10:*:*:*:*:*:*:*", "matchCriteriaId": "72EBCE6C-E0B9-4119-AD71-BF5CD3730D4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "5DBB2456-4B56-48CC-8A5C-55D5F9CC770B", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.10.2:*:*:*:*:*:*:*", "matchCriteriaId": "EE20AFEE-7287-4BCE-AE29-32E967FF8F9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.10.3:*:*:*:*:*:*:*", "matchCriteriaId": "1060ADF7-99EF-46B1-A999-106E86DC0562", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.10.4:*:*:*:*:*:*:*", "matchCriteriaId": "D66CFF54-F18B-4B82-A39D-99F1D53B6357", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.10.5:*:*:*:*:*:*:*", "matchCriteriaId": "9D7E1B7D-45B3-4803-B490-FDE40F018738", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.10.6:*:*:*:*:*:*:*", "matchCriteriaId": "2E1F9453-1FB6-4CA7-9285-A243E56667B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.10.7:*:*:*:*:*:*:*", "matchCriteriaId": "F79828BB-2412-46AD-BE3C-A51B48E191AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.10.8:*:*:*:*:*:*:*", "matchCriteriaId": "72D0F13F-D56F-4C1C-A3CF-2E4E704817CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "90A4F2E2-1B43-470E-8935-CB32F12A0124", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "797DF5C7-509E-48FD-BD04-C66E01748728", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.11.2:*:*:*:*:*:*:*", "matchCriteriaId": "47BD868A-CE3B-4E39-A588-C4EDA3265A71", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "4A2EE400-1C36-40F4-A9D1-9AB432F168BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "06E3CB14-FB16-4F4E-9AD9-A02DC727FF6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.12.2:*:*:*:*:*:*:*", "matchCriteriaId": "08DCC42C-C881-4AEA-9348-E8317C54D62B", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.12.3:*:*:*:*:*:*:*", "matchCriteriaId": "2BC4EF5A-C8CB-4F33-B4D1-E4192B179D26", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.13.0:*:*:*:*:*:*:*", "matchCriteriaId": "81CEF54A-9668-4031-926F-9B978DD5CDF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.13.1:*:*:*:*:*:*:*", "matchCriteriaId": "45068C90-8915-4D19-B36B-993980E28D08", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.13.2:*:*:*:*:*:*:*", "matchCriteriaId": "24543011-2458-47B5-984A-901E70084902", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.14.0:*:*:*:*:*:*:*", "matchCriteriaId": "FB482A9C-D577-4AEE-A08F-CAFA6586B51E", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.14.1:*:*:*:*:*:*:*", "matchCriteriaId": "65AF9B86-A555-4D5E-B24E-9EBF78BCD8CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.15.0:*:*:*:*:*:*:*", "matchCriteriaId": "60BBDF07-DB97-433E-B542-EFEBE45550DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.15.1:*:*:*:*:*:*:*", "matchCriteriaId": "CA8BE3F8-82ED-4DD7-991E-979E950C98B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.15.2:*:*:*:*:*:*:*", "matchCriteriaId": "738AA231-4694-46E8-B559-1594263A9987", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.15.3:*:*:*:*:*:*:*", "matchCriteriaId": "E9E1F171-B887-499A-BF4F-538EBF347811", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.15.4:*:*:*:*:*:*:*", "matchCriteriaId": "07AA276A-0EBA-4DC9-951C-8F8159FAC7A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.15.5:*:*:*:*:*:*:*", "matchCriteriaId": "8DEEF534-9AD2-4439-9D69-E91D062C4647", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.16.0:*:*:*:*:*:*:*", "matchCriteriaId": "63643BE1-C978-4CD2-8ED1-2B979DB0676E", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.16.1:*:*:*:*:*:*:*", "matchCriteriaId": "F6FA04A0-9258-4654-ABCF-F41340B1FA35", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.16.2:*:*:*:*:*:*:*", "matchCriteriaId": "DE829230-AFDB-4131-9C6A-D9D7A66C5B57", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.16.3:*:*:*:*:*:*:*", "matchCriteriaId": "B7E8BA30-8087-48D4-AE1B-48326FF826B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.16.4:*:*:*:*:*:*:*", "matchCriteriaId": "47970EFF-2F51-4875-A6BD-E30614E13278", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.17.0:*:*:*:*:*:*:*", "matchCriteriaId": "52C9B668-3204-41C5-A82E-262BDFA541DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*", "matchCriteriaId": "08C8EE1E-E186-42D6-8B12-05865C73F261", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*", "matchCriteriaId": "EEA3D88B-41B9-4D79-B47D-B3D6058C0C27", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.18.1:*:*:*:*:*:*:*", "matchCriteriaId": "C2C80901-D48E-4C2A-9BED-A40007A11C97", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*", "matchCriteriaId": "331A51E4-AA73-486F-9618-5A83965F2436", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.0:*:*:*:*:*:*:*", "matchCriteriaId": "EB32DF2C-9208-4853-ADEB-B00D764D7467", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.1:*:*:*:*:*:*:*", "matchCriteriaId": "E05636DC-7E38-4605-AAB8-81C0AE37520A", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.2:*:*:*:*:*:*:*", "matchCriteriaId": "624DF2F1-53FD-48D3-B93D-44E99C9C0C5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*", "matchCriteriaId": "F2171C7C-311A-4405-B95F-3A54966FA844", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.4:*:*:*:*:*:*:*", "matchCriteriaId": "5DE20A41-8B53-46FC-9002-69CC7495171F", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.5:*:*:*:*:*:*:*", "matchCriteriaId": "87ED9DA0-E880-4CBB-B1AC-5AEE8A004718", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.6:*:*:*:*:*:*:*", "matchCriteriaId": "5293C7F0-BF9F-4768-889A-876CE78903CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.7:*:*:*:*:*:*:*", "matchCriteriaId": "F3EB41B3-65F3-4B0E-8CCC-325B14AF605B", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "857B244C-2AFB-40C7-A893-7C6DE9871BCE", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.20.1:*:*:*:*:*:*:*", "matchCriteriaId": "B732CE55-820A-40E0-A885-71BBB6CF8C15", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.0:*:*:*:*:*:*:*", "matchCriteriaId": "0455A5F2-1515-4CD8-BA2F-74D28E91A661", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.1:*:*:*:*:*:*:*", "matchCriteriaId": "29034B3A-BE9D-4D68-8C56-4465C03C3693", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*", "matchCriteriaId": "6249538E-FBCB-4130-91FB-DA78D7BA45DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.3:*:*:*:*:*:*:*", "matchCriteriaId": "5E11B8A5-50A2-468F-BFB3-86DD9D28AC73", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.4:*:*:*:*:*:*:*", "matchCriteriaId": "9EAE25A0-3828-46F1-AB30-88732CBC9F38", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.5:*:*:*:*:*:*:*", "matchCriteriaId": "1533A85C-2160-445D-8787-E624AEDC5A0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.6:*:*:*:*:*:*:*", "matchCriteriaId": "D87B9393-7EA4-43DA-900C-7E840AE2D4C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.7:*:*:*:*:*:*:*", "matchCriteriaId": "7D1249E9-304F-4952-8DAB-8B79CE5E7D54", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*", "matchCriteriaId": "83FAF953-6A65-4FAB-BDB5-03B468CD1C9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*", "matchCriteriaId": "29F8FF1F-A639-4161-9366-62528AAF4C07", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.23.1:*:*:*:*:*:*:*", "matchCriteriaId": "812AB429-379A-4EDE-9664-5BC2989053F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.24.0:*:*:*:*:*:*:*", "matchCriteriaId": "13DD791F-C4BD-4456-955A-92E84082AA09", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.25.0:*:*:*:*:*:*:*", "matchCriteriaId": "4A17E442-45AA-4780-98B4-9BF764DCC1C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*", "matchCriteriaId": "F6AF544C-5F16-4434-B9FB-93B1B7318950", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*", "matchCriteriaId": "CBFD9ED9-2412-44AE-9C55-0ED03A121B23", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*", "matchCriteriaId": "67CCE31B-ABDA-4F32-BAF1-B1AD0664B3E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*", "matchCriteriaId": "9E66A332-ECD1-4452-B444-FB629022FDF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.29.0:*:*:*:*:*:*:*", "matchCriteriaId": "CDD3D599-35E9-4590-B5E0-3AF04D344695", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.30.0:*:*:*:*:*:*:*", "matchCriteriaId": "A3B6BFFB-7967-482C-9B49-4BD25C815299", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*", "matchCriteriaId": "1791BF6D-2C96-4A6E-90D4-2906A73601F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*", "matchCriteriaId": "260DD751-4145-4B75-B892-5FC932C6A305", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*", "matchCriteriaId": "EFF4AD0D-2EC5-4CE8-B6B3-2EC8ED2FF118", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*", "matchCriteriaId": "3EB1CB85-0A9B-4816-B471-278774EE6D4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*", "matchCriteriaId": "3831AB03-4E7E-476D-9623-58AADC188DFE", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*", "matchCriteriaId": "ABACE305-2F0C-4B59-BC5C-6DF162B450E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*", "matchCriteriaId": "6FAC1B55-F492-484E-B837-E7745682DE0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.37.1:*:*:*:*:*:*:*", "matchCriteriaId": "E0D57914-B40A-462B-9C78-6433BE2B2DB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.38.0:*:*:*:*:*:*:*", "matchCriteriaId": "A9A12DF7-62C5-46AD-9236-E2821C64156E", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.39:*:*:*:*:*:*:*", "matchCriteriaId": "4C43697D-390A-4AC0-A5D8-62B6D22245BF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*", "matchCriteriaId": "5D37DF0F-F863-45AC-853A-3E04F9FEC7CA", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*", "matchCriteriaId": "49A63F39-30BE-443F-AF10-6245587D3359", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "CRLF injection vulnerability in libcurl 6.0 through 7.x before 7.40.0, when using an HTTP proxy, allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via CRLF sequences in a URL." }, { "lang": "es", "value": "Vulnerabilidad de inyecci\u00f3n CRLF en libcurl 6.0 hasta 7.x anterior a 7.40.0, cuando utiliza un proxy HTTP, permite a atacantes remotos inyectar cabeceras HTTP arbitrarias y realizar ataques de divisi\u00f3n de respuestas HTTP a trav\u00e9s de secuencias de CRLF en una URL." } ], "evaluatorComment": "\u003ca href=\"http://cwe.mitre.org/data/definitions/93.html\" target=\"_blank\"\u003eCWE-93: CWE-93: Improper Neutralization of CRLF Sequences (\u0027CRLF Injection\u0027)\u003c/a\u003e", "id": "CVE-2014-8150", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2015-01-15T15:59:06.047", "references": [ { "source": "secalert@redhat.com", "url": "http://advisories.mageia.org/MGASA-2015-0020.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://curl.haxx.se/docs/adv_20150108B.html" }, { "source": "secalert@redhat.com", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10743" }, { "source": "secalert@redhat.com", "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147856.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147876.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156945.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157188.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00040.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2015-1254.html" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/61925" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/62075" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/62361" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2015/dsa-3122" }, { "source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:021" }, { "source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html" }, { "source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html" }, { "source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/71964" }, { "source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id/1032768" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/USN-2474-1" }, { "source": "secalert@redhat.com", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10131" }, { "source": "secalert@redhat.com", "url": "https://security.gentoo.org/glsa/201701-47" }, { "source": "secalert@redhat.com", "url": "https://support.apple.com/kb/HT205031" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://advisories.mageia.org/MGASA-2015-0020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://curl.haxx.se/docs/adv_20150108B.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10743" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147856.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147876.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156945.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157188.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00040.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2015-1254.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/61925" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62075" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62361" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2015/dsa-3122" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:021" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/71964" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1032768" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-2474-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10131" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201701-47" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.apple.com/kb/HT205031" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-10-18 04:15
Modified
2025-02-13 17:16
Severity ?
Summary
This flaw allows an attacker to insert cookies at will into a running program
using libcurl, if the specific series of conditions are met.
libcurl performs transfers. In its API, an application creates "easy handles"
that are the individual handles for single transfers.
libcurl provides a function call that duplicates en easy handle called
[curl_easy_duphandle](https://curl.se/libcurl/c/curl_easy_duphandle.html).
If a transfer has cookies enabled when the handle is duplicated, the
cookie-enable state is also cloned - but without cloning the actual
cookies. If the source handle did not read any cookies from a specific file on
disk, the cloned version of the handle would instead store the file name as
`none` (using the four ASCII letters, no quotes).
Subsequent use of the cloned handle that does not explicitly set a source to
load cookies from would then inadvertently load cookies from a file named
`none` - if such a file exists and is readable in the current directory of the
program using libcurl. And if using the correct file format of course.
References
▶ | URL | Tags | |
---|---|---|---|
support@hackerone.com | http://seclists.org/fulldisclosure/2024/Jan/34 | ||
support@hackerone.com | http://seclists.org/fulldisclosure/2024/Jan/37 | ||
support@hackerone.com | http://seclists.org/fulldisclosure/2024/Jan/38 | ||
support@hackerone.com | https://curl.se/docs/CVE-2023-38546.html | Patch, Third Party Advisory | |
support@hackerone.com | https://forum.vmssoftware.com/viewtopic.php?f=8&t=8868 | ||
support@hackerone.com | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OGMXNRNSJ4ETDK6FRNU3J7SABXPWCHSQ/ | ||
support@hackerone.com | https://support.apple.com/kb/HT214036 | ||
support@hackerone.com | https://support.apple.com/kb/HT214057 | ||
support@hackerone.com | https://support.apple.com/kb/HT214058 | ||
support@hackerone.com | https://support.apple.com/kb/HT214063 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2024/Jan/34 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2024/Jan/37 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2024/Jan/38 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://curl.se/docs/CVE-2023-38546.html | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://forum.vmssoftware.com/viewtopic.php?f=8&t=8868 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OGMXNRNSJ4ETDK6FRNU3J7SABXPWCHSQ/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT214036 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT214057 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT214058 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT214063 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*", "matchCriteriaId": "9058709C-7DD0-44D7-8224-535363E103A9", "versionEndExcluding": "8.4.0", "versionStartIncluding": "7.9.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "This flaw allows an attacker to insert cookies at will into a running program\nusing libcurl, if the specific series of conditions are met.\n\nlibcurl performs transfers. In its API, an application creates \"easy handles\"\nthat are the individual handles for single transfers.\n\nlibcurl provides a function call that duplicates en easy handle called\n[curl_easy_duphandle](https://curl.se/libcurl/c/curl_easy_duphandle.html).\n\nIf a transfer has cookies enabled when the handle is duplicated, the\ncookie-enable state is also cloned - but without cloning the actual\ncookies. If the source handle did not read any cookies from a specific file on\ndisk, the cloned version of the handle would instead store the file name as\n`none` (using the four ASCII letters, no quotes).\n\nSubsequent use of the cloned handle that does not explicitly set a source to\nload cookies from would then inadvertently load cookies from a file named\n`none` - if such a file exists and is readable in the current directory of the\nprogram using libcurl. And if using the correct file format of course." }, { "lang": "es", "value": "Esta falla permite a un atacante insertar cookies a voluntad en un programa en ejecuci\u00f3n usando libcurl, si se cumple una serie espec\u00edfica de condiciones. libcurl realiza transferencias. En su API, una aplicaci\u00f3n crea \"easy handles\" que son identificadores individuales para transferencias individuales. libcurl proporciona una llamada de funci\u00f3n que duplica un identificador sencillo llamado [curl_easy_duphandle](https://curl.se/libcurl/c/curl_easy_duphandle.html). Si una transferencia tiene cookies habilitadas cuando el identificador est\u00e1 duplicado, el estado de habilitaci\u00f3n de cookies tambi\u00e9n se clona, pero sin clonar las cookies reales. Si el identificador de origen no ley\u00f3 ninguna cookie de un archivo espec\u00edfico en el disco, la versi\u00f3n clonada del identificador almacenar\u00eda el nombre del archivo como \"none\" (usando las cuatro letras ASCII, sin comillas). El uso posterior del identificador clonado que no establece expl\u00edcitamente una fuente desde la cual cargar cookies cargar\u00eda inadvertidamente cookies desde un archivo llamado \"none\", si dicho archivo existe y es legible en el directorio actual del programa usando libcurl. Y si utiliza el formato de archivo correcto, por supuesto." } ], "id": "CVE-2023-38546", "lastModified": "2025-02-13T17:16:48.027", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-10-18T04:15:11.137", "references": [ { "source": "support@hackerone.com", "url": "http://seclists.org/fulldisclosure/2024/Jan/34" }, { "source": "support@hackerone.com", "url": "http://seclists.org/fulldisclosure/2024/Jan/37" }, { "source": "support@hackerone.com", "url": "http://seclists.org/fulldisclosure/2024/Jan/38" }, { "source": "support@hackerone.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://curl.se/docs/CVE-2023-38546.html" }, { "source": "support@hackerone.com", "url": "https://forum.vmssoftware.com/viewtopic.php?f=8\u0026t=8868" }, { "source": "support@hackerone.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OGMXNRNSJ4ETDK6FRNU3J7SABXPWCHSQ/" }, { "source": "support@hackerone.com", "url": "https://support.apple.com/kb/HT214036" }, { "source": "support@hackerone.com", "url": "https://support.apple.com/kb/HT214057" }, { "source": "support@hackerone.com", "url": "https://support.apple.com/kb/HT214058" }, { "source": "support@hackerone.com", "url": "https://support.apple.com/kb/HT214063" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2024/Jan/34" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2024/Jan/37" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2024/Jan/38" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://curl.se/docs/CVE-2023-38546.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://forum.vmssoftware.com/viewtopic.php?f=8\u0026t=8868" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OGMXNRNSJ4ETDK6FRNU3J7SABXPWCHSQ/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.apple.com/kb/HT214036" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.apple.com/kb/HT214057" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.apple.com/kb/HT214058" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.apple.com/kb/HT214063" } ], "sourceIdentifier": "support@hackerone.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-02-02 00:55
Modified
2025-04-11 00:51
Severity ?
Summary
cURL and libcurl 7.10.6 through 7.34.0, when more than one authentication method is enabled, re-uses NTLM connections, which might allow context-dependent attackers to authenticate as other users via a request.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://archives.neohapsis.com/archives/bugtraq/2014-06/0172.html | ||
secalert@redhat.com | http://curl.haxx.se/docs/adv_20140129.html | Patch, Vendor Advisory | |
secalert@redhat.com | http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743 | ||
secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127627.html | ||
secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128408.html | ||
secalert@redhat.com | http://lists.opensuse.org/opensuse-updates/2014-02/msg00066.html | ||
secalert@redhat.com | http://seclists.org/fulldisclosure/2014/Dec/23 | ||
secalert@redhat.com | http://secunia.com/advisories/56728 | Vendor Advisory | |
secalert@redhat.com | http://secunia.com/advisories/56731 | ||
secalert@redhat.com | http://secunia.com/advisories/56734 | Vendor Advisory | |
secalert@redhat.com | http://secunia.com/advisories/56912 | ||
secalert@redhat.com | http://secunia.com/advisories/59458 | ||
secalert@redhat.com | http://secunia.com/advisories/59475 | ||
secalert@redhat.com | http://support.apple.com/kb/HT6296 | ||
secalert@redhat.com | http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095862 | ||
secalert@redhat.com | http://www.debian.org/security/2014/dsa-2849 | ||
secalert@redhat.com | http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html | ||
secalert@redhat.com | http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html | ||
secalert@redhat.com | http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html | ||
secalert@redhat.com | http://www.securityfocus.com/archive/1/534161/100/0/threaded | ||
secalert@redhat.com | http://www.securityfocus.com/bid/65270 | ||
secalert@redhat.com | http://www.securitytracker.com/id/1029710 | ||
secalert@redhat.com | http://www.slackware.com/security/viewer.php?l=slackware-security&y=2014&m=slackware-security.502652 | ||
secalert@redhat.com | http://www.ubuntu.com/usn/USN-2097-1 | ||
secalert@redhat.com | http://www.vmware.com/security/advisories/VMSA-2014-0012.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://archives.neohapsis.com/archives/bugtraq/2014-06/0172.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://curl.haxx.se/docs/adv_20140129.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127627.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128408.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-updates/2014-02/msg00066.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2014/Dec/23 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/56728 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/56731 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/56734 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/56912 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/59458 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/59475 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://support.apple.com/kb/HT6296 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095862 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2014/dsa-2849 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/534161/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/65270 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1029710 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.slackware.com/security/viewer.php?l=slackware-security&y=2014&m=slackware-security.502652 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-2097-1 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vmware.com/security/advisories/VMSA-2014-0012.html |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
haxx | libcurl | 7.10.6 | |
haxx | libcurl | 7.10.7 | |
haxx | libcurl | 7.10.8 | |
haxx | libcurl | 7.11.0 | |
haxx | libcurl | 7.11.1 | |
haxx | libcurl | 7.11.2 | |
haxx | libcurl | 7.12.0 | |
haxx | libcurl | 7.12.1 | |
haxx | libcurl | 7.12.2 | |
haxx | libcurl | 7.12.3 | |
haxx | libcurl | 7.13.0 | |
haxx | libcurl | 7.13.1 | |
haxx | libcurl | 7.13.2 | |
haxx | libcurl | 7.14.0 | |
haxx | libcurl | 7.14.1 | |
haxx | libcurl | 7.15.0 | |
haxx | libcurl | 7.15.1 | |
haxx | libcurl | 7.15.2 | |
haxx | libcurl | 7.15.3 | |
haxx | libcurl | 7.15.4 | |
haxx | libcurl | 7.15.5 | |
haxx | libcurl | 7.16.0 | |
haxx | libcurl | 7.16.1 | |
haxx | libcurl | 7.16.2 | |
haxx | libcurl | 7.16.3 | |
haxx | libcurl | 7.16.4 | |
haxx | libcurl | 7.17.0 | |
haxx | libcurl | 7.17.1 | |
haxx | libcurl | 7.18.0 | |
haxx | libcurl | 7.18.1 | |
haxx | libcurl | 7.18.2 | |
haxx | libcurl | 7.19.0 | |
haxx | libcurl | 7.19.1 | |
haxx | libcurl | 7.19.2 | |
haxx | libcurl | 7.19.3 | |
haxx | libcurl | 7.19.4 | |
haxx | libcurl | 7.19.5 | |
haxx | libcurl | 7.19.6 | |
haxx | libcurl | 7.19.7 | |
haxx | libcurl | 7.20.0 | |
haxx | libcurl | 7.20.1 | |
haxx | libcurl | 7.21.0 | |
haxx | libcurl | 7.21.1 | |
haxx | libcurl | 7.21.2 | |
haxx | libcurl | 7.21.3 | |
haxx | libcurl | 7.21.4 | |
haxx | libcurl | 7.21.5 | |
haxx | libcurl | 7.21.6 | |
haxx | libcurl | 7.21.7 | |
haxx | libcurl | 7.22.0 | |
haxx | libcurl | 7.23.0 | |
haxx | libcurl | 7.23.1 | |
haxx | libcurl | 7.24.0 | |
haxx | libcurl | 7.25.0 | |
haxx | libcurl | 7.26.0 | |
haxx | libcurl | 7.27.0 | |
haxx | libcurl | 7.28.0 | |
haxx | libcurl | 7.28.1 | |
haxx | libcurl | 7.29.0 | |
haxx | libcurl | 7.30.0 | |
haxx | libcurl | 7.31.0 | |
haxx | libcurl | 7.32.0 | |
haxx | libcurl | 7.33.0 | |
haxx | libcurl | 7.34.0 | |
haxx | curl | 7.10.6 | |
haxx | curl | 7.10.7 | |
haxx | curl | 7.10.8 | |
haxx | curl | 7.11.0 | |
haxx | curl | 7.11.1 | |
haxx | curl | 7.11.2 | |
haxx | curl | 7.12.0 | |
haxx | curl | 7.12.1 | |
haxx | curl | 7.12.2 | |
haxx | curl | 7.12.3 | |
haxx | curl | 7.13.0 | |
haxx | curl | 7.13.1 | |
haxx | curl | 7.13.2 | |
haxx | curl | 7.14.0 | |
haxx | curl | 7.14.1 | |
haxx | curl | 7.15.0 | |
haxx | curl | 7.15.1 | |
haxx | curl | 7.15.2 | |
haxx | curl | 7.15.3 | |
haxx | curl | 7.15.4 | |
haxx | curl | 7.15.5 | |
haxx | curl | 7.16.0 | |
haxx | curl | 7.16.1 | |
haxx | curl | 7.16.2 | |
haxx | curl | 7.16.3 | |
haxx | curl | 7.16.4 | |
haxx | curl | 7.17.0 | |
haxx | curl | 7.17.1 | |
haxx | curl | 7.18.0 | |
haxx | curl | 7.18.1 | |
haxx | curl | 7.18.2 | |
haxx | curl | 7.19.0 | |
haxx | curl | 7.19.1 | |
haxx | curl | 7.19.2 | |
haxx | curl | 7.19.3 | |
haxx | curl | 7.19.4 | |
haxx | curl | 7.19.5 | |
haxx | curl | 7.19.6 | |
haxx | curl | 7.19.7 | |
haxx | curl | 7.20.0 | |
haxx | curl | 7.20.1 | |
haxx | curl | 7.21.0 | |
haxx | curl | 7.21.1 | |
haxx | curl | 7.21.2 | |
haxx | curl | 7.21.3 | |
haxx | curl | 7.21.4 | |
haxx | curl | 7.21.5 | |
haxx | curl | 7.21.6 | |
haxx | curl | 7.21.7 | |
haxx | curl | 7.22.0 | |
haxx | curl | 7.23.0 | |
haxx | curl | 7.23.1 | |
haxx | curl | 7.24.0 | |
haxx | curl | 7.25.0 | |
haxx | curl | 7.26.0 | |
haxx | curl | 7.27.0 | |
haxx | curl | 7.28.0 | |
haxx | curl | 7.28.1 | |
haxx | curl | 7.29.0 | |
haxx | curl | 7.30.0 | |
haxx | curl | 7.31.0 | |
haxx | curl | 7.32.0 | |
haxx | curl | 7.33.0 | |
haxx | curl | 7.34.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:haxx:libcurl:7.10.6:*:*:*:*:*:*:*", "matchCriteriaId": "2E1F9453-1FB6-4CA7-9285-A243E56667B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.10.7:*:*:*:*:*:*:*", "matchCriteriaId": "F79828BB-2412-46AD-BE3C-A51B48E191AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.10.8:*:*:*:*:*:*:*", "matchCriteriaId": "72D0F13F-D56F-4C1C-A3CF-2E4E704817CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "90A4F2E2-1B43-470E-8935-CB32F12A0124", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "797DF5C7-509E-48FD-BD04-C66E01748728", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.11.2:*:*:*:*:*:*:*", "matchCriteriaId": "47BD868A-CE3B-4E39-A588-C4EDA3265A71", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "4A2EE400-1C36-40F4-A9D1-9AB432F168BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "06E3CB14-FB16-4F4E-9AD9-A02DC727FF6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.12.2:*:*:*:*:*:*:*", "matchCriteriaId": "08DCC42C-C881-4AEA-9348-E8317C54D62B", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.12.3:*:*:*:*:*:*:*", "matchCriteriaId": "2BC4EF5A-C8CB-4F33-B4D1-E4192B179D26", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.13.0:*:*:*:*:*:*:*", "matchCriteriaId": "81CEF54A-9668-4031-926F-9B978DD5CDF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.13.1:*:*:*:*:*:*:*", "matchCriteriaId": "45068C90-8915-4D19-B36B-993980E28D08", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.13.2:*:*:*:*:*:*:*", "matchCriteriaId": "24543011-2458-47B5-984A-901E70084902", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.14.0:*:*:*:*:*:*:*", "matchCriteriaId": "FB482A9C-D577-4AEE-A08F-CAFA6586B51E", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.14.1:*:*:*:*:*:*:*", "matchCriteriaId": "65AF9B86-A555-4D5E-B24E-9EBF78BCD8CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.15.0:*:*:*:*:*:*:*", "matchCriteriaId": "60BBDF07-DB97-433E-B542-EFEBE45550DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.15.1:*:*:*:*:*:*:*", "matchCriteriaId": "CA8BE3F8-82ED-4DD7-991E-979E950C98B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.15.2:*:*:*:*:*:*:*", "matchCriteriaId": "738AA231-4694-46E8-B559-1594263A9987", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.15.3:*:*:*:*:*:*:*", "matchCriteriaId": "E9E1F171-B887-499A-BF4F-538EBF347811", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.15.4:*:*:*:*:*:*:*", "matchCriteriaId": "07AA276A-0EBA-4DC9-951C-8F8159FAC7A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.15.5:*:*:*:*:*:*:*", "matchCriteriaId": "8DEEF534-9AD2-4439-9D69-E91D062C4647", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.16.0:*:*:*:*:*:*:*", "matchCriteriaId": "63643BE1-C978-4CD2-8ED1-2B979DB0676E", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.16.1:*:*:*:*:*:*:*", "matchCriteriaId": "F6FA04A0-9258-4654-ABCF-F41340B1FA35", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.16.2:*:*:*:*:*:*:*", "matchCriteriaId": "DE829230-AFDB-4131-9C6A-D9D7A66C5B57", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.16.3:*:*:*:*:*:*:*", "matchCriteriaId": "B7E8BA30-8087-48D4-AE1B-48326FF826B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.16.4:*:*:*:*:*:*:*", "matchCriteriaId": "47970EFF-2F51-4875-A6BD-E30614E13278", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.17.0:*:*:*:*:*:*:*", "matchCriteriaId": "52C9B668-3204-41C5-A82E-262BDFA541DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*", "matchCriteriaId": "08C8EE1E-E186-42D6-8B12-05865C73F261", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*", "matchCriteriaId": "EEA3D88B-41B9-4D79-B47D-B3D6058C0C27", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.18.1:*:*:*:*:*:*:*", "matchCriteriaId": "C2C80901-D48E-4C2A-9BED-A40007A11C97", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*", "matchCriteriaId": "331A51E4-AA73-486F-9618-5A83965F2436", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.0:*:*:*:*:*:*:*", "matchCriteriaId": "EB32DF2C-9208-4853-ADEB-B00D764D7467", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.1:*:*:*:*:*:*:*", "matchCriteriaId": "E05636DC-7E38-4605-AAB8-81C0AE37520A", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.2:*:*:*:*:*:*:*", "matchCriteriaId": "624DF2F1-53FD-48D3-B93D-44E99C9C0C5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*", "matchCriteriaId": "F2171C7C-311A-4405-B95F-3A54966FA844", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.4:*:*:*:*:*:*:*", "matchCriteriaId": "5DE20A41-8B53-46FC-9002-69CC7495171F", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.5:*:*:*:*:*:*:*", "matchCriteriaId": "87ED9DA0-E880-4CBB-B1AC-5AEE8A004718", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.6:*:*:*:*:*:*:*", "matchCriteriaId": "5293C7F0-BF9F-4768-889A-876CE78903CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.7:*:*:*:*:*:*:*", "matchCriteriaId": "F3EB41B3-65F3-4B0E-8CCC-325B14AF605B", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "857B244C-2AFB-40C7-A893-7C6DE9871BCE", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.20.1:*:*:*:*:*:*:*", "matchCriteriaId": "B732CE55-820A-40E0-A885-71BBB6CF8C15", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.0:*:*:*:*:*:*:*", "matchCriteriaId": "0455A5F2-1515-4CD8-BA2F-74D28E91A661", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.1:*:*:*:*:*:*:*", "matchCriteriaId": "29034B3A-BE9D-4D68-8C56-4465C03C3693", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*", "matchCriteriaId": "6249538E-FBCB-4130-91FB-DA78D7BA45DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.3:*:*:*:*:*:*:*", "matchCriteriaId": "5E11B8A5-50A2-468F-BFB3-86DD9D28AC73", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.4:*:*:*:*:*:*:*", "matchCriteriaId": "9EAE25A0-3828-46F1-AB30-88732CBC9F38", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.5:*:*:*:*:*:*:*", "matchCriteriaId": "1533A85C-2160-445D-8787-E624AEDC5A0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.6:*:*:*:*:*:*:*", "matchCriteriaId": "D87B9393-7EA4-43DA-900C-7E840AE2D4C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.7:*:*:*:*:*:*:*", "matchCriteriaId": "7D1249E9-304F-4952-8DAB-8B79CE5E7D54", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*", "matchCriteriaId": "83FAF953-6A65-4FAB-BDB5-03B468CD1C9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*", "matchCriteriaId": "29F8FF1F-A639-4161-9366-62528AAF4C07", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.23.1:*:*:*:*:*:*:*", "matchCriteriaId": "812AB429-379A-4EDE-9664-5BC2989053F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.24.0:*:*:*:*:*:*:*", "matchCriteriaId": "13DD791F-C4BD-4456-955A-92E84082AA09", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.25.0:*:*:*:*:*:*:*", "matchCriteriaId": "4A17E442-45AA-4780-98B4-9BF764DCC1C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*", "matchCriteriaId": "F6AF544C-5F16-4434-B9FB-93B1B7318950", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*", "matchCriteriaId": "CBFD9ED9-2412-44AE-9C55-0ED03A121B23", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*", "matchCriteriaId": "67CCE31B-ABDA-4F32-BAF1-B1AD0664B3E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*", "matchCriteriaId": "9E66A332-ECD1-4452-B444-FB629022FDF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.29.0:*:*:*:*:*:*:*", "matchCriteriaId": "CDD3D599-35E9-4590-B5E0-3AF04D344695", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.30.0:*:*:*:*:*:*:*", "matchCriteriaId": "A3B6BFFB-7967-482C-9B49-4BD25C815299", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*", "matchCriteriaId": "1791BF6D-2C96-4A6E-90D4-2906A73601F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*", "matchCriteriaId": "260DD751-4145-4B75-B892-5FC932C6A305", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*", "matchCriteriaId": "EFF4AD0D-2EC5-4CE8-B6B3-2EC8ED2FF118", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*", "matchCriteriaId": "3EB1CB85-0A9B-4816-B471-278774EE6D4C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:haxx:curl:7.10.6:*:*:*:*:*:*:*", "matchCriteriaId": "5D65CDC0-580B-42B3-97E8-69BE44CDB68C", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.10.7:*:*:*:*:*:*:*", "matchCriteriaId": "01001EEA-AB99-4041-8188-38CEBE9C3031", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.10.8:*:*:*:*:*:*:*", "matchCriteriaId": "31DB0DA3-88B7-43ED-8102-CEBC28524CE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "87596B6A-A7B3-4256-9982-45D3B6E3E018", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "0045855F-A707-415A-AC12-6981B68B08E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.11.2:*:*:*:*:*:*:*", "matchCriteriaId": "B49807DC-0BDA-41F6-BB76-7C62328D245F", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "0A78B6B8-9F4B-46AC-BB04-7EBADC690CBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "EFE80B46-33F0-4338-AF37-9E7E31FC5E83", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.12.2:*:*:*:*:*:*:*", "matchCriteriaId": "DD38D8C6-9EEE-4160-9353-773943A560B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.12.3:*:*:*:*:*:*:*", "matchCriteriaId": "FD33549E-EFFB-466F-8B47-BE036D454693", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.13.0:*:*:*:*:*:*:*", "matchCriteriaId": "16BB71C8-3564-4E69-A2C3-E9AB1F9EF20C", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.13.1:*:*:*:*:*:*:*", "matchCriteriaId": "4966AA12-15DB-44E5-84AF-9D7AF4A52F86", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.13.2:*:*:*:*:*:*:*", "matchCriteriaId": "827B6C8A-59C4-4714-9406-5C8EB5073AB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.14.0:*:*:*:*:*:*:*", "matchCriteriaId": "93A11305-E4FF-473B-9415-AF1F0E7A27D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.14.1:*:*:*:*:*:*:*", "matchCriteriaId": "8444095B-AF8F-42B5-BD4D-9CBE9238E42D", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.15.0:*:*:*:*:*:*:*", "matchCriteriaId": "C22F23AE-02AB-42F0-AA16-D2F8C94E5DE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B33DE520-BD2A-4499-B1F8-1439AE16AB57", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.15.2:*:*:*:*:*:*:*", "matchCriteriaId": "041FCB20-E74F-4550-AC48-EE4E5875E118", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.15.3:*:*:*:*:*:*:*", "matchCriteriaId": "D16DBA5E-582F-4648-932E-8A1EFB7FE3D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.15.4:*:*:*:*:*:*:*", "matchCriteriaId": "A25323F4-7C67-4097-AD53-A6B9E6D96BA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.15.5:*:*:*:*:*:*:*", "matchCriteriaId": "36919682-F59E-4EC0-886C-AE967F636753", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.16.0:*:*:*:*:*:*:*", "matchCriteriaId": "B45AF234-3651-4367-BFEF-8766F66FB138", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.16.1:*:*:*:*:*:*:*", "matchCriteriaId": "E46A9126-A02E-44CD-885D-0956E0C87C2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.16.2:*:*:*:*:*:*:*", "matchCriteriaId": "91E9C756-7FE3-4197-8C18-99CD1F49B0D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.16.3:*:*:*:*:*:*:*", "matchCriteriaId": "88806B7D-5EFE-4F91-B115-732882D2C126", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.16.4:*:*:*:*:*:*:*", "matchCriteriaId": "5BB9E8AB-B3EC-4743-B39B-7325EEB17233", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.17.0:*:*:*:*:*:*:*", "matchCriteriaId": "5030FBB0-C95B-4ADE-BFC2-CCA37AAD019B", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.17.1:*:*:*:*:*:*:*", "matchCriteriaId": "5513618A-6770-4292-95D1-68F55D8343CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.18.0:*:*:*:*:*:*:*", "matchCriteriaId": "7494C01F-E9EC-406E-879A-B2045865E282", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.18.1:*:*:*:*:*:*:*", "matchCriteriaId": "7DD9F894-4576-4ED1-9F55-4C27ECE7E058", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.18.2:*:*:*:*:*:*:*", "matchCriteriaId": "49AFACAC-BBAF-469B-BF05-0478E987120F", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.19.0:*:*:*:*:*:*:*", "matchCriteriaId": "6A136E86-0697-4915-BC49-F570C776EDE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.19.1:*:*:*:*:*:*:*", "matchCriteriaId": "ECB241AF-A01D-4FD6-B98A-F4C20F844C2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.19.2:*:*:*:*:*:*:*", "matchCriteriaId": "C5B61901-F7DF-4805-8EB7-CA1701CA81CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.19.3:*:*:*:*:*:*:*", "matchCriteriaId": "EB0CDEC9-224A-4668-B2E4-2145653E3F2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.19.4:*:*:*:*:*:*:*", "matchCriteriaId": "E92BE9CB-F001-47A0-94E0-48FC01A63FE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.19.5:*:*:*:*:*:*:*", "matchCriteriaId": "324E2A20-2F66-4E03-9A7F-A09E631E9033", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.19.6:*:*:*:*:*:*:*", "matchCriteriaId": "C8987B53-BD80-40B9-8429-21AD97208040", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.19.7:*:*:*:*:*:*:*", "matchCriteriaId": "490D1BDC-33B9-43BA-B6DA-42DEE577082A", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "B465BE7E-0B4D-4BC4-894B-3F51A201CE91", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.20.1:*:*:*:*:*:*:*", "matchCriteriaId": "CAA17087-3021-4961-B53C-CDCC872A31A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.21.0:*:*:*:*:*:*:*", "matchCriteriaId": "E5CA3936-4602-40E6-B75C-58D3F24268E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.21.1:*:*:*:*:*:*:*", "matchCriteriaId": "D87C110C-21DD-438A-90EF-BE516CF59F3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.21.2:*:*:*:*:*:*:*", "matchCriteriaId": "AD2D9E0E-2EED-4FB5-859C-05226FC48D7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.21.3:*:*:*:*:*:*:*", "matchCriteriaId": "7CA01E21-71CE-4B07-B5A6-D0D7AC493A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.21.4:*:*:*:*:*:*:*", "matchCriteriaId": "51239254-31CE-4BF7-8669-1525BA391362", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.21.5:*:*:*:*:*:*:*", "matchCriteriaId": "2E2BE20D-232D-4C86-81B0-C82CCC1CAA62", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.21.6:*:*:*:*:*:*:*", "matchCriteriaId": "D652FD7C-1521-4391-AAE1-0A4D6F4CE8F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.21.7:*:*:*:*:*:*:*", "matchCriteriaId": "DB861143-F809-45CF-95BE-E64F4BA1A0DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.22.0:*:*:*:*:*:*:*", "matchCriteriaId": "E3480F4A-0AE0-4428-9EDA-5A6B994909A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.23.0:*:*:*:*:*:*:*", "matchCriteriaId": "936BF59E-33A8-46BA-9FBD-8763812E2F10", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.23.1:*:*:*:*:*:*:*", "matchCriteriaId": "33168C81-6DAE-40D6-9693-68390CD71DA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.24.0:*:*:*:*:*:*:*", "matchCriteriaId": "424F9604-AA9A-4D45-A521-0BDEDB723659", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.25.0:*:*:*:*:*:*:*", "matchCriteriaId": "DC6EBCEB-E52C-4FF5-B15A-6960F58090EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.26.0:*:*:*:*:*:*:*", "matchCriteriaId": "D204E994-4591-403C-8EF3-D3B7BF4AA1A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.27.0:*:*:*:*:*:*:*", "matchCriteriaId": "EBF5418D-1162-4B1E-BC3D-06A3E084BEFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.28.0:*:*:*:*:*:*:*", "matchCriteriaId": "1CA65F31-3D54-4F66-A0A3-2BD993FF38F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.28.1:*:*:*:*:*:*:*", "matchCriteriaId": "41ACC9FE-62FF-424B-B4B8-B033FEAF7686", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.29.0:*:*:*:*:*:*:*", "matchCriteriaId": "F8BC39E9-5945-4DC8-ACA8-1C9918D9F279", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.30.0:*:*:*:*:*:*:*", "matchCriteriaId": "B9658447-FBB0-4DEA-8FEE-BD4D3D1BF7FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.31.0:*:*:*:*:*:*:*", "matchCriteriaId": "5ECABFCB-0D02-4B5B-BB35-C6B3C0896348", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.32.0:*:*:*:*:*:*:*", "matchCriteriaId": "5A5176F0-E62F-46FF-B536-DC0680696773", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.33.0:*:*:*:*:*:*:*", "matchCriteriaId": "506A3761-3D24-43DB-88D8-4EB5B9E8BA5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.34.0:*:*:*:*:*:*:*", "matchCriteriaId": "0B6EF8B0-0E86-449C-A500-ACD902A78C7F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "cURL and libcurl 7.10.6 through 7.34.0, when more than one authentication method is enabled, re-uses NTLM connections, which might allow context-dependent attackers to authenticate as other users via a request." }, { "lang": "es", "value": "cURL y libcurl 7.10.6 hasta 7.34.0, cuando m\u00e1s de un m\u00e9todo de autenticaci\u00f3n est\u00e1 habilitado, reutiliza conexiones NTLM, lo que podr\u00eda permitir a atacantes dependientes de contexto autenticarse como otros usuarios a trav\u00e9s de una solicitud." } ], "id": "CVE-2014-0015", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-02-02T00:55:05.317", "references": [ { "source": "secalert@redhat.com", "url": "http://archives.neohapsis.com/archives/bugtraq/2014-06/0172.html" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://curl.haxx.se/docs/adv_20140129.html" }, { "source": "secalert@redhat.com", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10743" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127627.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128408.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-updates/2014-02/msg00066.html" }, { "source": "secalert@redhat.com", "url": "http://seclists.org/fulldisclosure/2014/Dec/23" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/56728" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/56731" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/56734" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/56912" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/59458" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/59475" }, { "source": "secalert@redhat.com", "url": "http://support.apple.com/kb/HT6296" }, { "source": "secalert@redhat.com", "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095862" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2014/dsa-2849" }, { "source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html" }, { "source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html" }, { "source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/65270" }, { "source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id/1029710" }, { "source": "secalert@redhat.com", "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2014\u0026m=slackware-security.502652" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/USN-2097-1" }, { "source": "secalert@redhat.com", "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.neohapsis.com/archives/bugtraq/2014-06/0172.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://curl.haxx.se/docs/adv_20140129.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10743" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127627.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128408.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2014-02/msg00066.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2014/Dec/23" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/56728" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/56731" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/56734" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/56912" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/59458" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/59475" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.apple.com/kb/HT6296" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095862" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2014/dsa-2849" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/65270" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1029710" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2014\u0026m=slackware-security.502652" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-2097-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-04-24 14:59
Modified
2025-04-12 10:46
Severity ?
Summary
The sanitize_cookie_path function in cURL and libcurl 7.31.0 through 7.41.0 does not properly calculate an index, which allows remote attackers to cause a denial of service (out-of-bounds write and crash) or possibly have other unspecified impact via a cookie path containing only a double-quote character.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://advisories.mageia.org/MGASA-2015-0179.html | Third Party Advisory | |
secalert@redhat.com | http://curl.haxx.se/docs/adv_20150422C.html | Vendor Advisory | |
secalert@redhat.com | http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743 | ||
secalert@redhat.com | http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html | Third Party Advisory | |
secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155957.html | Third Party Advisory | |
secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156250.html | ||
secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156945.html | Third Party Advisory | |
secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157017.html | Third Party Advisory | |
secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157188.html | Third Party Advisory | |
secalert@redhat.com | http://lists.opensuse.org/opensuse-updates/2015-04/msg00057.html | Third Party Advisory | |
secalert@redhat.com | http://www.debian.org/security/2015/dsa-3232 | Third Party Advisory | |
secalert@redhat.com | http://www.mandriva.com/security/advisories?name=MDVSA-2015:219 | Third Party Advisory | |
secalert@redhat.com | http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html | ||
secalert@redhat.com | http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html | Third Party Advisory | |
secalert@redhat.com | http://www.securityfocus.com/bid/74303 | ||
secalert@redhat.com | http://www.securitytracker.com/id/1032232 | Third Party Advisory, VDB Entry | |
secalert@redhat.com | http://www.ubuntu.com/usn/USN-2591-1 | Third Party Advisory | |
secalert@redhat.com | https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763 | Third Party Advisory | |
secalert@redhat.com | https://security.gentoo.org/glsa/201509-02 | ||
secalert@redhat.com | https://support.apple.com/kb/HT205031 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://advisories.mageia.org/MGASA-2015-0179.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://curl.haxx.se/docs/adv_20150422C.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155957.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156250.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156945.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157017.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157188.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-updates/2015-04/msg00057.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2015/dsa-3232 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2015:219 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/74303 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1032232 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-2591-1 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/201509-02 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT205031 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
fedoraproject | fedora | 21 | |
fedoraproject | fedora | 22 | |
canonical | ubuntu_linux | 12.04 | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 14.10 | |
canonical | ubuntu_linux | 15.04 | |
debian | debian_linux | 7.0 | |
haxx | curl | 7.31.0 | |
haxx | curl | 7.32.0 | |
haxx | curl | 7.33.0 | |
haxx | curl | 7.34.0 | |
haxx | curl | 7.35.0 | |
haxx | curl | 7.36.0 | |
haxx | curl | 7.37.0 | |
haxx | curl | 7.37.1 | |
haxx | curl | 7.38.0 | |
haxx | curl | 7.39.0 | |
haxx | curl | 7.40.0 | |
haxx | curl | 7.41.0 | |
apple | mac_os_x | 10.10.0 | |
apple | mac_os_x | 10.10.1 | |
apple | mac_os_x | 10.10.2 | |
apple | mac_os_x | 10.10.3 | |
apple | mac_os_x | 10.10.4 | |
oracle | solaris | 11.3 | |
haxx | libcurl | 7.30.0 | |
haxx | libcurl | 7.31.0 | |
haxx | libcurl | 7.32.0 | |
haxx | libcurl | 7.33.0 | |
haxx | libcurl | 7.34.0 | |
haxx | libcurl | 7.35.0 | |
haxx | libcurl | 7.36.0 | |
haxx | libcurl | 7.37.0 | |
haxx | libcurl | 7.37.1 | |
haxx | libcurl | 7.38.0 | |
haxx | libcurl | 7.39 | |
haxx | libcurl | 7.40.0 | |
haxx | libcurl | 7.41.0 | |
hp | system_management_homepage | * | |
opensuse | opensuse | 13.1 | |
opensuse | opensuse | 13.2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*", "matchCriteriaId": "56BDB5A0-0839-4A20-A003-B8CD56F48171", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*", "matchCriteriaId": "253C303A-E577-4488-93E6-68A8DD942C38", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*", "matchCriteriaId": "49A63F39-30BE-443F-AF10-6245587D3359", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*", "matchCriteriaId": "F38D3B7E-8429-473F-BB31-FC3583EE5A5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:haxx:curl:7.31.0:*:*:*:*:*:*:*", "matchCriteriaId": "5ECABFCB-0D02-4B5B-BB35-C6B3C0896348", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.32.0:*:*:*:*:*:*:*", "matchCriteriaId": "5A5176F0-E62F-46FF-B536-DC0680696773", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.33.0:*:*:*:*:*:*:*", "matchCriteriaId": "506A3761-3D24-43DB-88D8-4EB5B9E8BA5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.34.0:*:*:*:*:*:*:*", "matchCriteriaId": "0B6EF8B0-0E86-449C-A500-ACD902A78C7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.35.0:*:*:*:*:*:*:*", "matchCriteriaId": "4D558CC2-0146-4887-834E-19FCB1D512A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.36.0:*:*:*:*:*:*:*", "matchCriteriaId": "6931764D-16AB-4546-9CE3-5B4E03BC984A", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.37.0:*:*:*:*:*:*:*", "matchCriteriaId": "6FC1313E-8DCB-4B29-A9BC-A27C8CB360E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.37.1:*:*:*:*:*:*:*", "matchCriteriaId": "B27C2E02-5C0A-4A12-B0A6-5B1C0DFA94E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.38.0:*:*:*:*:*:*:*", "matchCriteriaId": "EFC7535F-B8C7-490F-A2F9-1DCFD41A3C9B", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.39.0:*:*:*:*:*:*:*", "matchCriteriaId": "3CCBFE6D-F6A9-4394-9AF8-F830DC7E6A81", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.40.0:*:*:*:*:*:*:*", "matchCriteriaId": "5DEBBFCA-6A18-4F8F-B841-50255C952FA0", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.41.0:*:*:*:*:*:*:*", "matchCriteriaId": "FEEAE437-A645-468B-B283-44799658F534", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:10.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "C8A2286E-9D1C-4B56-8B40-150201B818AF", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "0AF9BC68-7F0D-4DF9-9CD8-6CE9844555C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.10.2:*:*:*:*:*:*:*", "matchCriteriaId": "D35FAC77-A0DD-4AF9-AA9E-A4B170842D2D", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.10.3:*:*:*:*:*:*:*", "matchCriteriaId": "831B1114-7CA7-43E3-9A15-592218060A1F", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.10.4:*:*:*:*:*:*:*", "matchCriteriaId": "E8B0A12E-E122-4189-A05E-4FEA43C19876", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*", "matchCriteriaId": "79A602C5-61FE-47BA-9786-F045B6C6DBA8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:haxx:libcurl:7.30.0:*:*:*:*:*:*:*", "matchCriteriaId": "A3B6BFFB-7967-482C-9B49-4BD25C815299", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*", "matchCriteriaId": "1791BF6D-2C96-4A6E-90D4-2906A73601F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*", "matchCriteriaId": "260DD751-4145-4B75-B892-5FC932C6A305", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*", "matchCriteriaId": "EFF4AD0D-2EC5-4CE8-B6B3-2EC8ED2FF118", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*", "matchCriteriaId": "3EB1CB85-0A9B-4816-B471-278774EE6D4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*", "matchCriteriaId": "3831AB03-4E7E-476D-9623-58AADC188DFE", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*", "matchCriteriaId": "ABACE305-2F0C-4B59-BC5C-6DF162B450E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*", "matchCriteriaId": "6FAC1B55-F492-484E-B837-E7745682DE0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.37.1:*:*:*:*:*:*:*", "matchCriteriaId": "E0D57914-B40A-462B-9C78-6433BE2B2DB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.38.0:*:*:*:*:*:*:*", "matchCriteriaId": "A9A12DF7-62C5-46AD-9236-E2821C64156E", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.39:*:*:*:*:*:*:*", "matchCriteriaId": "4C43697D-390A-4AC0-A5D8-62B6D22245BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.40.0:*:*:*:*:*:*:*", "matchCriteriaId": "D52E9E9F-7A35-4CB9-813E-5A1D4A36415C", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.41.0:*:*:*:*:*:*:*", "matchCriteriaId": "257291FB-969C-4413-BA81-806B5E1B40A7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hp:system_management_homepage:*:*:*:*:*:*:*:*", "matchCriteriaId": "D06BF4CE-299F-42E4-BA0A-5D68788C92DF", "versionEndIncluding": "7.5.3.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "matchCriteriaId": "A10BC294-9196-425F-9FB0-B1625465B47F", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "matchCriteriaId": "03117DF1-3BEC-4B8D-AD63-DBBDB2126081", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The sanitize_cookie_path function in cURL and libcurl 7.31.0 through 7.41.0 does not properly calculate an index, which allows remote attackers to cause a denial of service (out-of-bounds write and crash) or possibly have other unspecified impact via a cookie path containing only a double-quote character." }, { "lang": "es", "value": "La funci\u00f3n sanitize_cookie_path en cURL y libcurl 7.31.0 hasta 7.41.0 no calcula correctamente un indice, lo que permite a atacantes remotos causar una denegaci\u00f3n de servicio (escritura fuera de rango y ca\u00edda) o posiblemente tener otro impacto no especificado a trav\u00e9s de una ruta de cookie que contiene solamente un car\u00e1cter de comillas dobles." } ], "id": "CVE-2015-3145", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-04-24T14:59:10.157", "references": [ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://advisories.mageia.org/MGASA-2015-0179.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://curl.haxx.se/docs/adv_20150422C.html" }, { "source": "secalert@redhat.com", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10743" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155957.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156250.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156945.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157017.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157188.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00057.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2015/dsa-3232" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:219" }, { "source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/74303" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1032232" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2591-1" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763" }, { "source": "secalert@redhat.com", "url": "https://security.gentoo.org/glsa/201509-02" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT205031" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://advisories.mageia.org/MGASA-2015-0179.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://curl.haxx.se/docs/adv_20150422C.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10743" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155957.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156250.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156945.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157017.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157188.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00057.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2015/dsa-3232" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:219" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/74303" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1032232" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2591-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201509-02" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT205031" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-07-24 08:15
Modified
2024-11-29 12:15
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
libcurl's ASN1 parser has this utf8asn1str() function used for parsing an ASN.1 UTF-8 string. Itcan detect an invalid field and return error. Unfortunately, when doing so it also invokes `free()` on a 4 byte localstack buffer. Most modern malloc implementations detect this error and immediately abort. Some however accept the input pointer and add that memory to its list of available chunks. This leads to the overwriting of nearby stack memory. The content of the overwrite is decided by the `free()` implementation; likely to be memory pointers and a set of flags. The most likely outcome of exploting this flaw is a crash, although it cannot be ruled out that more serious results can be had in special circumstances.
References
▶ | URL | Tags | |
---|---|---|---|
2499f714-1537-4658-8207-48ae4bb9eae9 | http://www.openwall.com/lists/oss-security/2024/07/24/1 | Mailing List, Third Party Advisory | |
2499f714-1537-4658-8207-48ae4bb9eae9 | http://www.openwall.com/lists/oss-security/2024/07/24/5 | Mailing List, Third Party Advisory | |
2499f714-1537-4658-8207-48ae4bb9eae9 | https://curl.se/docs/CVE-2024-6197.html | Vendor Advisory | |
2499f714-1537-4658-8207-48ae4bb9eae9 | https://curl.se/docs/CVE-2024-6197.json | Vendor Advisory | |
2499f714-1537-4658-8207-48ae4bb9eae9 | https://hackerone.com/reports/2559516 | Exploit, Issue Tracking, Technical Description | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2024/07/24/1 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2024/07/24/5 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://curl.se/docs/CVE-2024-6197.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://curl.se/docs/CVE-2024-6197.json | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://hackerone.com/reports/2559516 | Exploit, Issue Tracking, Technical Description | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20241129-0008/ |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*", "matchCriteriaId": "3D3B1F73-722A-4CD2-B1C4-830050B881D6", "versionEndExcluding": "8.9.0", "versionStartIncluding": "8.6.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "libcurl\u0027s ASN1 parser has this utf8asn1str() function used for parsing an ASN.1 UTF-8 string. Itcan detect an invalid field and return error. Unfortunately, when doing so it also invokes `free()` on a 4 byte localstack buffer. Most modern malloc implementations detect this error and immediately abort. Some however accept the input pointer and add that memory to its list of available chunks. This leads to the overwriting of nearby stack memory. The content of the overwrite is decided by the `free()` implementation; likely to be memory pointers and a set of flags. The most likely outcome of exploting this flaw is a crash, although it cannot be ruled out that more serious results can be had in special circumstances." }, { "lang": "es", "value": "El analizador ASN1 de libcurl tiene esta funci\u00f3n utf8asn1str() utilizada para analizar una cadena ASN.1 UTF-8. Puede detectar un campo no v\u00e1lido y devolver un error. Desafortunadamente, al hacerlo tambi\u00e9n invoca `free()` en un b\u00fafer localstack de 4 bytes. La mayor\u00eda de las implementaciones modernas de malloc detectan este error y lo abortan inmediatamente. Sin embargo, algunos aceptan el puntero de entrada y agregan esa memoria a su lista de fragmentos disponibles. Esto lleva a la sobrescritura de la memoria de stack. El contenido de la sobrescritura lo decide la implementaci\u00f3n `free()`; Es probable que sean punteros de memoria y un conjunto de banderas. El resultado m\u00e1s probable de explotar este defecto es un colapso, aunque no se puede descartar que se puedan obtener resultados m\u00e1s graves en circunstancias especiales." } ], "id": "CVE-2024-6197", "lastModified": "2024-11-29T12:15:08.430", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2024-07-24T08:15:03.340", "references": [ { "source": "2499f714-1537-4658-8207-48ae4bb9eae9", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2024/07/24/1" }, { "source": "2499f714-1537-4658-8207-48ae4bb9eae9", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2024/07/24/5" }, { "source": "2499f714-1537-4658-8207-48ae4bb9eae9", "tags": [ "Vendor Advisory" ], "url": "https://curl.se/docs/CVE-2024-6197.html" }, { "source": "2499f714-1537-4658-8207-48ae4bb9eae9", "tags": [ "Vendor Advisory" ], "url": "https://curl.se/docs/CVE-2024-6197.json" }, { "source": "2499f714-1537-4658-8207-48ae4bb9eae9", "tags": [ "Exploit", "Issue Tracking", "Technical Description" ], "url": "https://hackerone.com/reports/2559516" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2024/07/24/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2024/07/24/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://curl.se/docs/CVE-2024-6197.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://curl.se/docs/CVE-2024-6197.json" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Technical Description" ], "url": "https://hackerone.com/reports/2559516" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.netapp.com/advisory/ntap-20241129-0008/" } ], "sourceIdentifier": "2499f714-1537-4658-8207-48ae4bb9eae9", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-04-24 14:59
Modified
2025-04-12 10:46
Severity ?
Summary
cURL and libcurl 7.10.6 through 7.41.0 do not properly re-use authenticated Negotiate connections, which allows remote attackers to connect as other users via a request.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://advisories.mageia.org/MGASA-2015-0179.html | Third Party Advisory | |
secalert@redhat.com | http://curl.haxx.se/docs/adv_20150422B.html | Vendor Advisory | |
secalert@redhat.com | http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743 | ||
secalert@redhat.com | http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html | Mailing List, Vendor Advisory | |
secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155957.html | Third Party Advisory | |
secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156250.html | ||
secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156945.html | Third Party Advisory | |
secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157017.html | Third Party Advisory | |
secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157188.html | Third Party Advisory | |
secalert@redhat.com | http://lists.opensuse.org/opensuse-updates/2015-04/msg00057.html | ||
secalert@redhat.com | http://marc.info/?l=bugtraq&m=145612005512270&w=2 | Third Party Advisory | |
secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2015-1254.html | ||
secalert@redhat.com | http://www.debian.org/security/2015/dsa-3232 | Third Party Advisory | |
secalert@redhat.com | http://www.mandriva.com/security/advisories?name=MDVSA-2015:219 | ||
secalert@redhat.com | http://www.mandriva.com/security/advisories?name=MDVSA-2015:220 | Third Party Advisory, VDB Entry | |
secalert@redhat.com | http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html | ||
secalert@redhat.com | http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html | ||
secalert@redhat.com | http://www.securityfocus.com/bid/74301 | ||
secalert@redhat.com | http://www.securitytracker.com/id/1032232 | Third Party Advisory | |
secalert@redhat.com | http://www.ubuntu.com/usn/USN-2591-1 | Third Party Advisory | |
secalert@redhat.com | https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763 | Vendor Advisory | |
secalert@redhat.com | https://security.gentoo.org/glsa/201509-02 | ||
secalert@redhat.com | https://support.apple.com/kb/HT205031 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://advisories.mageia.org/MGASA-2015-0179.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://curl.haxx.se/docs/adv_20150422B.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html | Mailing List, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155957.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156250.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156945.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157017.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157188.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-updates/2015-04/msg00057.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=145612005512270&w=2 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2015-1254.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2015/dsa-3232 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2015:219 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2015:220 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/74301 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1032232 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-2591-1 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/201509-02 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT205031 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
fedoraproject | fedora | 21 | |
fedoraproject | fedora | 22 | |
canonical | ubuntu_linux | 12.04 | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 14.10 | |
canonical | ubuntu_linux | 15.04 | |
debian | debian_linux | 7.0 | |
apple | mac_os_x | 10.10.0 | |
apple | mac_os_x | 10.10.1 | |
apple | mac_os_x | 10.10.2 | |
apple | mac_os_x | 10.10.3 | |
apple | mac_os_x | 10.10.4 | |
haxx | libcurl | 7.10.6 | |
haxx | libcurl | 7.10.7 | |
haxx | libcurl | 7.10.8 | |
haxx | libcurl | 7.11.0 | |
haxx | libcurl | 7.11.1 | |
haxx | libcurl | 7.11.2 | |
haxx | libcurl | 7.12.0 | |
haxx | libcurl | 7.12.1 | |
haxx | libcurl | 7.12.2 | |
haxx | libcurl | 7.12.3 | |
haxx | libcurl | 7.13.0 | |
haxx | libcurl | 7.13.1 | |
haxx | libcurl | 7.13.2 | |
haxx | libcurl | 7.14.0 | |
haxx | libcurl | 7.14.1 | |
haxx | libcurl | 7.15.0 | |
haxx | libcurl | 7.15.1 | |
haxx | libcurl | 7.15.2 | |
haxx | libcurl | 7.15.3 | |
haxx | libcurl | 7.15.4 | |
haxx | libcurl | 7.15.5 | |
haxx | libcurl | 7.16.0 | |
haxx | libcurl | 7.16.1 | |
haxx | libcurl | 7.16.2 | |
haxx | libcurl | 7.16.3 | |
haxx | libcurl | 7.16.4 | |
haxx | libcurl | 7.17.0 | |
haxx | libcurl | 7.17.1 | |
haxx | libcurl | 7.18.0 | |
haxx | libcurl | 7.18.1 | |
haxx | libcurl | 7.18.2 | |
haxx | libcurl | 7.19.0 | |
haxx | libcurl | 7.19.1 | |
haxx | libcurl | 7.19.2 | |
haxx | libcurl | 7.19.3 | |
haxx | libcurl | 7.19.4 | |
haxx | libcurl | 7.19.5 | |
haxx | libcurl | 7.19.6 | |
haxx | libcurl | 7.19.7 | |
haxx | libcurl | 7.20.0 | |
haxx | libcurl | 7.20.1 | |
haxx | libcurl | 7.21.0 | |
haxx | libcurl | 7.21.1 | |
haxx | libcurl | 7.21.2 | |
haxx | libcurl | 7.21.3 | |
haxx | libcurl | 7.21.4 | |
haxx | libcurl | 7.21.5 | |
haxx | libcurl | 7.21.6 | |
haxx | libcurl | 7.21.7 | |
haxx | libcurl | 7.22.0 | |
haxx | libcurl | 7.23.0 | |
haxx | libcurl | 7.23.1 | |
haxx | libcurl | 7.24.0 | |
haxx | libcurl | 7.25.0 | |
haxx | libcurl | 7.26.0 | |
haxx | libcurl | 7.27.0 | |
haxx | libcurl | 7.28.0 | |
haxx | libcurl | 7.28.1 | |
haxx | libcurl | 7.29.0 | |
haxx | libcurl | 7.30.0 | |
haxx | libcurl | 7.31.0 | |
haxx | libcurl | 7.32.0 | |
haxx | libcurl | 7.33.0 | |
haxx | libcurl | 7.34.0 | |
haxx | libcurl | 7.35.0 | |
haxx | libcurl | 7.36.0 | |
haxx | libcurl | 7.37.0 | |
haxx | libcurl | 7.37.1 | |
haxx | libcurl | 7.38.0 | |
haxx | libcurl | 7.39 | |
haxx | libcurl | 7.40.0 | |
haxx | libcurl | 7.41.0 | |
hp | system_management_homepage | * | |
haxx | curl | 7.10.6 | |
haxx | curl | 7.10.7 | |
haxx | curl | 7.10.8 | |
haxx | curl | 7.11.0 | |
haxx | curl | 7.11.1 | |
haxx | curl | 7.11.2 | |
haxx | curl | 7.12.0 | |
haxx | curl | 7.12.1 | |
haxx | curl | 7.12.2 | |
haxx | curl | 7.12.3 | |
haxx | curl | 7.13.0 | |
haxx | curl | 7.13.1 | |
haxx | curl | 7.13.2 | |
haxx | curl | 7.14.0 | |
haxx | curl | 7.14.1 | |
haxx | curl | 7.15.0 | |
haxx | curl | 7.15.1 | |
haxx | curl | 7.15.2 | |
haxx | curl | 7.15.3 | |
haxx | curl | 7.15.4 | |
haxx | curl | 7.15.5 | |
haxx | curl | 7.16.0 | |
haxx | curl | 7.16.1 | |
haxx | curl | 7.16.2 | |
haxx | curl | 7.16.3 | |
haxx | curl | 7.16.4 | |
haxx | curl | 7.17.0 | |
haxx | curl | 7.17.1 | |
haxx | curl | 7.18.0 | |
haxx | curl | 7.18.1 | |
haxx | curl | 7.18.2 | |
haxx | curl | 7.19.0 | |
haxx | curl | 7.19.1 | |
haxx | curl | 7.19.2 | |
haxx | curl | 7.19.3 | |
haxx | curl | 7.19.4 | |
haxx | curl | 7.19.5 | |
haxx | curl | 7.19.6 | |
haxx | curl | 7.19.7 | |
haxx | curl | 7.20.0 | |
haxx | curl | 7.20.1 | |
haxx | curl | 7.21.0 | |
haxx | curl | 7.21.1 | |
haxx | curl | 7.21.2 | |
haxx | curl | 7.21.3 | |
haxx | curl | 7.21.4 | |
haxx | curl | 7.21.5 | |
haxx | curl | 7.21.6 | |
haxx | curl | 7.21.7 | |
haxx | curl | 7.22.0 | |
haxx | curl | 7.23.0 | |
haxx | curl | 7.23.1 | |
haxx | curl | 7.24.0 | |
haxx | curl | 7.25.0 | |
haxx | curl | 7.26.0 | |
haxx | curl | 7.27.0 | |
haxx | curl | 7.28.0 | |
haxx | curl | 7.28.1 | |
haxx | curl | 7.29.0 | |
haxx | curl | 7.30.0 | |
haxx | curl | 7.31.0 | |
haxx | curl | 7.32.0 | |
haxx | curl | 7.33.0 | |
haxx | curl | 7.34.0 | |
haxx | curl | 7.35.0 | |
haxx | curl | 7.36.0 | |
haxx | curl | 7.37.0 | |
haxx | curl | 7.37.1 | |
haxx | curl | 7.38.0 | |
haxx | curl | 7.39.0 | |
haxx | curl | 7.40.0 | |
haxx | curl | 7.41.0 | |
opensuse | opensuse | 13.1 | |
opensuse | opensuse | 13.2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*", "matchCriteriaId": "56BDB5A0-0839-4A20-A003-B8CD56F48171", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*", "matchCriteriaId": "253C303A-E577-4488-93E6-68A8DD942C38", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*", "matchCriteriaId": "49A63F39-30BE-443F-AF10-6245587D3359", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*", "matchCriteriaId": "F38D3B7E-8429-473F-BB31-FC3583EE5A5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:10.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "C8A2286E-9D1C-4B56-8B40-150201B818AF", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "0AF9BC68-7F0D-4DF9-9CD8-6CE9844555C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.10.2:*:*:*:*:*:*:*", "matchCriteriaId": "D35FAC77-A0DD-4AF9-AA9E-A4B170842D2D", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.10.3:*:*:*:*:*:*:*", "matchCriteriaId": "831B1114-7CA7-43E3-9A15-592218060A1F", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.10.4:*:*:*:*:*:*:*", "matchCriteriaId": "E8B0A12E-E122-4189-A05E-4FEA43C19876", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:haxx:libcurl:7.10.6:*:*:*:*:*:*:*", "matchCriteriaId": "2E1F9453-1FB6-4CA7-9285-A243E56667B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.10.7:*:*:*:*:*:*:*", "matchCriteriaId": "F79828BB-2412-46AD-BE3C-A51B48E191AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.10.8:*:*:*:*:*:*:*", "matchCriteriaId": "72D0F13F-D56F-4C1C-A3CF-2E4E704817CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "90A4F2E2-1B43-470E-8935-CB32F12A0124", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "797DF5C7-509E-48FD-BD04-C66E01748728", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.11.2:*:*:*:*:*:*:*", "matchCriteriaId": "47BD868A-CE3B-4E39-A588-C4EDA3265A71", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "4A2EE400-1C36-40F4-A9D1-9AB432F168BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "06E3CB14-FB16-4F4E-9AD9-A02DC727FF6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.12.2:*:*:*:*:*:*:*", "matchCriteriaId": "08DCC42C-C881-4AEA-9348-E8317C54D62B", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.12.3:*:*:*:*:*:*:*", "matchCriteriaId": "2BC4EF5A-C8CB-4F33-B4D1-E4192B179D26", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.13.0:*:*:*:*:*:*:*", "matchCriteriaId": "81CEF54A-9668-4031-926F-9B978DD5CDF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.13.1:*:*:*:*:*:*:*", "matchCriteriaId": "45068C90-8915-4D19-B36B-993980E28D08", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.13.2:*:*:*:*:*:*:*", "matchCriteriaId": "24543011-2458-47B5-984A-901E70084902", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.14.0:*:*:*:*:*:*:*", "matchCriteriaId": "FB482A9C-D577-4AEE-A08F-CAFA6586B51E", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.14.1:*:*:*:*:*:*:*", "matchCriteriaId": "65AF9B86-A555-4D5E-B24E-9EBF78BCD8CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.15.0:*:*:*:*:*:*:*", "matchCriteriaId": "60BBDF07-DB97-433E-B542-EFEBE45550DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.15.1:*:*:*:*:*:*:*", "matchCriteriaId": "CA8BE3F8-82ED-4DD7-991E-979E950C98B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.15.2:*:*:*:*:*:*:*", "matchCriteriaId": "738AA231-4694-46E8-B559-1594263A9987", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.15.3:*:*:*:*:*:*:*", "matchCriteriaId": "E9E1F171-B887-499A-BF4F-538EBF347811", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.15.4:*:*:*:*:*:*:*", "matchCriteriaId": "07AA276A-0EBA-4DC9-951C-8F8159FAC7A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.15.5:*:*:*:*:*:*:*", "matchCriteriaId": "8DEEF534-9AD2-4439-9D69-E91D062C4647", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.16.0:*:*:*:*:*:*:*", "matchCriteriaId": "63643BE1-C978-4CD2-8ED1-2B979DB0676E", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.16.1:*:*:*:*:*:*:*", "matchCriteriaId": "F6FA04A0-9258-4654-ABCF-F41340B1FA35", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.16.2:*:*:*:*:*:*:*", "matchCriteriaId": "DE829230-AFDB-4131-9C6A-D9D7A66C5B57", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.16.3:*:*:*:*:*:*:*", "matchCriteriaId": "B7E8BA30-8087-48D4-AE1B-48326FF826B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.16.4:*:*:*:*:*:*:*", "matchCriteriaId": "47970EFF-2F51-4875-A6BD-E30614E13278", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.17.0:*:*:*:*:*:*:*", "matchCriteriaId": "52C9B668-3204-41C5-A82E-262BDFA541DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*", "matchCriteriaId": "08C8EE1E-E186-42D6-8B12-05865C73F261", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*", "matchCriteriaId": "EEA3D88B-41B9-4D79-B47D-B3D6058C0C27", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.18.1:*:*:*:*:*:*:*", "matchCriteriaId": "C2C80901-D48E-4C2A-9BED-A40007A11C97", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*", "matchCriteriaId": "331A51E4-AA73-486F-9618-5A83965F2436", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.0:*:*:*:*:*:*:*", "matchCriteriaId": "EB32DF2C-9208-4853-ADEB-B00D764D7467", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.1:*:*:*:*:*:*:*", "matchCriteriaId": "E05636DC-7E38-4605-AAB8-81C0AE37520A", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.2:*:*:*:*:*:*:*", "matchCriteriaId": "624DF2F1-53FD-48D3-B93D-44E99C9C0C5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*", "matchCriteriaId": "F2171C7C-311A-4405-B95F-3A54966FA844", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.4:*:*:*:*:*:*:*", "matchCriteriaId": "5DE20A41-8B53-46FC-9002-69CC7495171F", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.5:*:*:*:*:*:*:*", "matchCriteriaId": "87ED9DA0-E880-4CBB-B1AC-5AEE8A004718", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.6:*:*:*:*:*:*:*", "matchCriteriaId": "5293C7F0-BF9F-4768-889A-876CE78903CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.7:*:*:*:*:*:*:*", "matchCriteriaId": "F3EB41B3-65F3-4B0E-8CCC-325B14AF605B", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "857B244C-2AFB-40C7-A893-7C6DE9871BCE", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.20.1:*:*:*:*:*:*:*", "matchCriteriaId": "B732CE55-820A-40E0-A885-71BBB6CF8C15", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.0:*:*:*:*:*:*:*", "matchCriteriaId": "0455A5F2-1515-4CD8-BA2F-74D28E91A661", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.1:*:*:*:*:*:*:*", "matchCriteriaId": "29034B3A-BE9D-4D68-8C56-4465C03C3693", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*", "matchCriteriaId": "6249538E-FBCB-4130-91FB-DA78D7BA45DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.3:*:*:*:*:*:*:*", "matchCriteriaId": "5E11B8A5-50A2-468F-BFB3-86DD9D28AC73", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.4:*:*:*:*:*:*:*", "matchCriteriaId": "9EAE25A0-3828-46F1-AB30-88732CBC9F38", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.5:*:*:*:*:*:*:*", "matchCriteriaId": "1533A85C-2160-445D-8787-E624AEDC5A0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.6:*:*:*:*:*:*:*", "matchCriteriaId": "D87B9393-7EA4-43DA-900C-7E840AE2D4C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.7:*:*:*:*:*:*:*", "matchCriteriaId": "7D1249E9-304F-4952-8DAB-8B79CE5E7D54", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*", "matchCriteriaId": "83FAF953-6A65-4FAB-BDB5-03B468CD1C9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*", "matchCriteriaId": "29F8FF1F-A639-4161-9366-62528AAF4C07", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.23.1:*:*:*:*:*:*:*", "matchCriteriaId": "812AB429-379A-4EDE-9664-5BC2989053F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.24.0:*:*:*:*:*:*:*", "matchCriteriaId": "13DD791F-C4BD-4456-955A-92E84082AA09", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.25.0:*:*:*:*:*:*:*", "matchCriteriaId": "4A17E442-45AA-4780-98B4-9BF764DCC1C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*", "matchCriteriaId": "F6AF544C-5F16-4434-B9FB-93B1B7318950", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*", "matchCriteriaId": "CBFD9ED9-2412-44AE-9C55-0ED03A121B23", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*", "matchCriteriaId": "67CCE31B-ABDA-4F32-BAF1-B1AD0664B3E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*", "matchCriteriaId": "9E66A332-ECD1-4452-B444-FB629022FDF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.29.0:*:*:*:*:*:*:*", "matchCriteriaId": "CDD3D599-35E9-4590-B5E0-3AF04D344695", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.30.0:*:*:*:*:*:*:*", "matchCriteriaId": "A3B6BFFB-7967-482C-9B49-4BD25C815299", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*", "matchCriteriaId": "1791BF6D-2C96-4A6E-90D4-2906A73601F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*", "matchCriteriaId": "260DD751-4145-4B75-B892-5FC932C6A305", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*", "matchCriteriaId": "EFF4AD0D-2EC5-4CE8-B6B3-2EC8ED2FF118", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*", "matchCriteriaId": "3EB1CB85-0A9B-4816-B471-278774EE6D4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*", "matchCriteriaId": "3831AB03-4E7E-476D-9623-58AADC188DFE", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*", "matchCriteriaId": "ABACE305-2F0C-4B59-BC5C-6DF162B450E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*", "matchCriteriaId": "6FAC1B55-F492-484E-B837-E7745682DE0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.37.1:*:*:*:*:*:*:*", "matchCriteriaId": "E0D57914-B40A-462B-9C78-6433BE2B2DB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.38.0:*:*:*:*:*:*:*", "matchCriteriaId": "A9A12DF7-62C5-46AD-9236-E2821C64156E", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.39:*:*:*:*:*:*:*", "matchCriteriaId": "4C43697D-390A-4AC0-A5D8-62B6D22245BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.40.0:*:*:*:*:*:*:*", "matchCriteriaId": "D52E9E9F-7A35-4CB9-813E-5A1D4A36415C", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.41.0:*:*:*:*:*:*:*", "matchCriteriaId": "257291FB-969C-4413-BA81-806B5E1B40A7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hp:system_management_homepage:*:*:*:*:*:*:*:*", "matchCriteriaId": "D06BF4CE-299F-42E4-BA0A-5D68788C92DF", "versionEndIncluding": "7.5.3.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:haxx:curl:7.10.6:*:*:*:*:*:*:*", "matchCriteriaId": "5D65CDC0-580B-42B3-97E8-69BE44CDB68C", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.10.7:*:*:*:*:*:*:*", "matchCriteriaId": "01001EEA-AB99-4041-8188-38CEBE9C3031", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.10.8:*:*:*:*:*:*:*", "matchCriteriaId": "31DB0DA3-88B7-43ED-8102-CEBC28524CE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "87596B6A-A7B3-4256-9982-45D3B6E3E018", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "0045855F-A707-415A-AC12-6981B68B08E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.11.2:*:*:*:*:*:*:*", "matchCriteriaId": "B49807DC-0BDA-41F6-BB76-7C62328D245F", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "0A78B6B8-9F4B-46AC-BB04-7EBADC690CBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "EFE80B46-33F0-4338-AF37-9E7E31FC5E83", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.12.2:*:*:*:*:*:*:*", "matchCriteriaId": "DD38D8C6-9EEE-4160-9353-773943A560B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.12.3:*:*:*:*:*:*:*", "matchCriteriaId": "FD33549E-EFFB-466F-8B47-BE036D454693", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.13.0:*:*:*:*:*:*:*", "matchCriteriaId": "16BB71C8-3564-4E69-A2C3-E9AB1F9EF20C", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.13.1:*:*:*:*:*:*:*", "matchCriteriaId": "4966AA12-15DB-44E5-84AF-9D7AF4A52F86", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.13.2:*:*:*:*:*:*:*", "matchCriteriaId": "827B6C8A-59C4-4714-9406-5C8EB5073AB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.14.0:*:*:*:*:*:*:*", "matchCriteriaId": "93A11305-E4FF-473B-9415-AF1F0E7A27D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.14.1:*:*:*:*:*:*:*", "matchCriteriaId": "8444095B-AF8F-42B5-BD4D-9CBE9238E42D", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.15.0:*:*:*:*:*:*:*", "matchCriteriaId": "C22F23AE-02AB-42F0-AA16-D2F8C94E5DE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B33DE520-BD2A-4499-B1F8-1439AE16AB57", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.15.2:*:*:*:*:*:*:*", "matchCriteriaId": "041FCB20-E74F-4550-AC48-EE4E5875E118", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.15.3:*:*:*:*:*:*:*", "matchCriteriaId": "D16DBA5E-582F-4648-932E-8A1EFB7FE3D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.15.4:*:*:*:*:*:*:*", "matchCriteriaId": "A25323F4-7C67-4097-AD53-A6B9E6D96BA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.15.5:*:*:*:*:*:*:*", "matchCriteriaId": "36919682-F59E-4EC0-886C-AE967F636753", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.16.0:*:*:*:*:*:*:*", "matchCriteriaId": "B45AF234-3651-4367-BFEF-8766F66FB138", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.16.1:*:*:*:*:*:*:*", "matchCriteriaId": "E46A9126-A02E-44CD-885D-0956E0C87C2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.16.2:*:*:*:*:*:*:*", "matchCriteriaId": "91E9C756-7FE3-4197-8C18-99CD1F49B0D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.16.3:*:*:*:*:*:*:*", "matchCriteriaId": "88806B7D-5EFE-4F91-B115-732882D2C126", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.16.4:*:*:*:*:*:*:*", "matchCriteriaId": "5BB9E8AB-B3EC-4743-B39B-7325EEB17233", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.17.0:*:*:*:*:*:*:*", "matchCriteriaId": "5030FBB0-C95B-4ADE-BFC2-CCA37AAD019B", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.17.1:*:*:*:*:*:*:*", "matchCriteriaId": "5513618A-6770-4292-95D1-68F55D8343CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.18.0:*:*:*:*:*:*:*", "matchCriteriaId": "7494C01F-E9EC-406E-879A-B2045865E282", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.18.1:*:*:*:*:*:*:*", "matchCriteriaId": "7DD9F894-4576-4ED1-9F55-4C27ECE7E058", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.18.2:*:*:*:*:*:*:*", "matchCriteriaId": "49AFACAC-BBAF-469B-BF05-0478E987120F", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.19.0:*:*:*:*:*:*:*", "matchCriteriaId": "6A136E86-0697-4915-BC49-F570C776EDE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.19.1:*:*:*:*:*:*:*", "matchCriteriaId": "ECB241AF-A01D-4FD6-B98A-F4C20F844C2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.19.2:*:*:*:*:*:*:*", "matchCriteriaId": "C5B61901-F7DF-4805-8EB7-CA1701CA81CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.19.3:*:*:*:*:*:*:*", "matchCriteriaId": "EB0CDEC9-224A-4668-B2E4-2145653E3F2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.19.4:*:*:*:*:*:*:*", "matchCriteriaId": "E92BE9CB-F001-47A0-94E0-48FC01A63FE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.19.5:*:*:*:*:*:*:*", "matchCriteriaId": "324E2A20-2F66-4E03-9A7F-A09E631E9033", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.19.6:*:*:*:*:*:*:*", "matchCriteriaId": "C8987B53-BD80-40B9-8429-21AD97208040", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.19.7:*:*:*:*:*:*:*", "matchCriteriaId": "490D1BDC-33B9-43BA-B6DA-42DEE577082A", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "B465BE7E-0B4D-4BC4-894B-3F51A201CE91", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.20.1:*:*:*:*:*:*:*", "matchCriteriaId": "CAA17087-3021-4961-B53C-CDCC872A31A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.21.0:*:*:*:*:*:*:*", "matchCriteriaId": "E5CA3936-4602-40E6-B75C-58D3F24268E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.21.1:*:*:*:*:*:*:*", "matchCriteriaId": "D87C110C-21DD-438A-90EF-BE516CF59F3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.21.2:*:*:*:*:*:*:*", "matchCriteriaId": "AD2D9E0E-2EED-4FB5-859C-05226FC48D7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.21.3:*:*:*:*:*:*:*", "matchCriteriaId": "7CA01E21-71CE-4B07-B5A6-D0D7AC493A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.21.4:*:*:*:*:*:*:*", "matchCriteriaId": "51239254-31CE-4BF7-8669-1525BA391362", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.21.5:*:*:*:*:*:*:*", "matchCriteriaId": "2E2BE20D-232D-4C86-81B0-C82CCC1CAA62", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.21.6:*:*:*:*:*:*:*", "matchCriteriaId": "D652FD7C-1521-4391-AAE1-0A4D6F4CE8F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.21.7:*:*:*:*:*:*:*", "matchCriteriaId": "DB861143-F809-45CF-95BE-E64F4BA1A0DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.22.0:*:*:*:*:*:*:*", "matchCriteriaId": "E3480F4A-0AE0-4428-9EDA-5A6B994909A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.23.0:*:*:*:*:*:*:*", "matchCriteriaId": "936BF59E-33A8-46BA-9FBD-8763812E2F10", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.23.1:*:*:*:*:*:*:*", "matchCriteriaId": "33168C81-6DAE-40D6-9693-68390CD71DA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.24.0:*:*:*:*:*:*:*", "matchCriteriaId": "424F9604-AA9A-4D45-A521-0BDEDB723659", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.25.0:*:*:*:*:*:*:*", "matchCriteriaId": "DC6EBCEB-E52C-4FF5-B15A-6960F58090EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.26.0:*:*:*:*:*:*:*", "matchCriteriaId": "D204E994-4591-403C-8EF3-D3B7BF4AA1A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.27.0:*:*:*:*:*:*:*", "matchCriteriaId": "EBF5418D-1162-4B1E-BC3D-06A3E084BEFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.28.0:*:*:*:*:*:*:*", "matchCriteriaId": "1CA65F31-3D54-4F66-A0A3-2BD993FF38F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.28.1:*:*:*:*:*:*:*", "matchCriteriaId": "41ACC9FE-62FF-424B-B4B8-B033FEAF7686", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.29.0:*:*:*:*:*:*:*", "matchCriteriaId": "F8BC39E9-5945-4DC8-ACA8-1C9918D9F279", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.30.0:*:*:*:*:*:*:*", "matchCriteriaId": "B9658447-FBB0-4DEA-8FEE-BD4D3D1BF7FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.31.0:*:*:*:*:*:*:*", "matchCriteriaId": "5ECABFCB-0D02-4B5B-BB35-C6B3C0896348", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.32.0:*:*:*:*:*:*:*", "matchCriteriaId": "5A5176F0-E62F-46FF-B536-DC0680696773", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.33.0:*:*:*:*:*:*:*", "matchCriteriaId": "506A3761-3D24-43DB-88D8-4EB5B9E8BA5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.34.0:*:*:*:*:*:*:*", "matchCriteriaId": "0B6EF8B0-0E86-449C-A500-ACD902A78C7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.35.0:*:*:*:*:*:*:*", "matchCriteriaId": "4D558CC2-0146-4887-834E-19FCB1D512A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.36.0:*:*:*:*:*:*:*", "matchCriteriaId": "6931764D-16AB-4546-9CE3-5B4E03BC984A", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.37.0:*:*:*:*:*:*:*", "matchCriteriaId": "6FC1313E-8DCB-4B29-A9BC-A27C8CB360E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.37.1:*:*:*:*:*:*:*", "matchCriteriaId": "B27C2E02-5C0A-4A12-B0A6-5B1C0DFA94E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.38.0:*:*:*:*:*:*:*", "matchCriteriaId": "EFC7535F-B8C7-490F-A2F9-1DCFD41A3C9B", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.39.0:*:*:*:*:*:*:*", "matchCriteriaId": "3CCBFE6D-F6A9-4394-9AF8-F830DC7E6A81", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.40.0:*:*:*:*:*:*:*", "matchCriteriaId": "5DEBBFCA-6A18-4F8F-B841-50255C952FA0", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.41.0:*:*:*:*:*:*:*", "matchCriteriaId": "FEEAE437-A645-468B-B283-44799658F534", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "matchCriteriaId": "A10BC294-9196-425F-9FB0-B1625465B47F", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "matchCriteriaId": "03117DF1-3BEC-4B8D-AD63-DBBDB2126081", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "cURL and libcurl 7.10.6 through 7.41.0 do not properly re-use authenticated Negotiate connections, which allows remote attackers to connect as other users via a request." }, { "lang": "es", "value": "cURL y libcurl 7.10.6 hasta la versi\u00f3n 7.41.0 no reutiliza adecuadamente la conexiones Negotiate autenticadas, lo que permite a atacantes remotos conectarse como otros usuarios a trav\u00e9s de una solicitud." } ], "id": "CVE-2015-3148", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-04-24T14:59:11.000", "references": [ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://advisories.mageia.org/MGASA-2015-0179.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://curl.haxx.se/docs/adv_20150422B.html" }, { "source": "secalert@redhat.com", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10743" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155957.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156250.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156945.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157017.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157188.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00057.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=145612005512270\u0026w=2" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2015-1254.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2015/dsa-3232" }, { "source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:219" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:220" }, { "source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html" }, { "source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/74301" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.securitytracker.com/id/1032232" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2591-1" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763" }, { "source": "secalert@redhat.com", "url": "https://security.gentoo.org/glsa/201509-02" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://support.apple.com/kb/HT205031" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://advisories.mageia.org/MGASA-2015-0179.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://curl.haxx.se/docs/adv_20150422B.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10743" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155957.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156250.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156945.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157017.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157188.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00057.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=145612005512270\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2015-1254.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2015/dsa-3232" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:219" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:220" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/74301" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.securitytracker.com/id/1032232" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2591-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201509-02" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.apple.com/kb/HT205031" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-284" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-10-31 21:29
Modified
2025-04-20 01:37
Severity ?
Summary
An IMAP FETCH response line indicates the size of the returned data, in number of bytes. When that response says the data is zero bytes, libcurl would pass on that (non-existing) data with a pointer and the size (zero) to the deliver-data function. libcurl's deliver-data function treats zero as a magic number and invokes strlen() on the data to figure out the length. The strlen() is called on a heap based buffer that might not be zero terminated so libcurl might read beyond the end of it into whatever memory lies after (or just crash) and then deliver that to the application as if it was actually downloaded.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.debian.org/security/2017/dsa-4007 | Third Party Advisory | |
cve@mitre.org | http://www.securityfocus.com/bid/101519 | Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.securitytracker.com/id/1039644 | Third Party Advisory, VDB Entry | |
cve@mitre.org | https://access.redhat.com/errata/RHSA-2017:3263 | ||
cve@mitre.org | https://access.redhat.com/errata/RHSA-2018:2486 | ||
cve@mitre.org | https://access.redhat.com/errata/RHSA-2018:3558 | ||
cve@mitre.org | https://curl.haxx.se/docs/adv_20171023.html | Vendor Advisory | |
cve@mitre.org | https://security.gentoo.org/glsa/201712-04 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2017/dsa-4007 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/101519 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1039644 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2017:3263 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:2486 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:3558 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://curl.haxx.se/docs/adv_20171023.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/201712-04 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
haxx | libcurl | * | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*", "matchCriteriaId": "A472460B-2EE1-49F4-BF4F-CFFB6EDDEE8A", "versionEndIncluding": "7.56.0", "versionStartIncluding": "7.20.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An IMAP FETCH response line indicates the size of the returned data, in number of bytes. When that response says the data is zero bytes, libcurl would pass on that (non-existing) data with a pointer and the size (zero) to the deliver-data function. libcurl\u0027s deliver-data function treats zero as a magic number and invokes strlen() on the data to figure out the length. The strlen() is called on a heap based buffer that might not be zero terminated so libcurl might read beyond the end of it into whatever memory lies after (or just crash) and then deliver that to the application as if it was actually downloaded." }, { "lang": "es", "value": "Una l\u00ednea de respuesta IMAP FETCH indica el tama\u00f1o de los datos devueltos en n\u00famero de bytes. Cuando una respuesta indica que el tama\u00f1o de los datos es cero bytes, libcurl pasar\u00eda esos datos (inexistentes) con un puntero y el tama\u00f1o (cero) a la funci\u00f3n deliver-data. La funci\u00f3n deliver-data de libcurl trata el cero como un n\u00famero m\u00e1gico e invoca strlen() en los datos para adivinar la longitud. Se llama a strlen() en un b\u00fafer basado en memoria din\u00e1mica (heap) que podr\u00eda no terminar en cero, por lo que libcurl podr\u00eda leer m\u00e1s all\u00e1 del final del b\u00fafer en cualquier memoria en la que se encuentre despu\u00e9s (o simplemente provocar un cierre inesperado) y entregar los datos a la aplicaci\u00f3n como si en realidad se hubieran descargado." } ], "id": "CVE-2017-1000257", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-10-31T21:29:00.203", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2017/dsa-4007" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/101519" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039644" }, { "source": "cve@mitre.org", "url": "https://access.redhat.com/errata/RHSA-2017:3263" }, { "source": "cve@mitre.org", "url": "https://access.redhat.com/errata/RHSA-2018:2486" }, { "source": "cve@mitre.org", "url": "https://access.redhat.com/errata/RHSA-2018:3558" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://curl.haxx.se/docs/adv_20171023.html" }, { "source": "cve@mitre.org", "url": "https://security.gentoo.org/glsa/201712-04" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2017/dsa-4007" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/101519" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039644" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2017:3263" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2018:2486" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2018:3558" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://curl.haxx.se/docs/adv_20171023.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201712-04" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-07-07 21:55
Modified
2025-04-11 00:51
Severity ?
Summary
The Curl_input_negotiate function in http_negotiate.c in libcurl 7.10.6 through 7.21.6, as used in curl and other products, always performs credential delegation during GSSAPI authentication, which allows remote servers to impersonate clients via GSSAPI requests.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://curl.haxx.se/curl-gssapi-delegation.patch | Broken Link | |
secalert@redhat.com | http://curl.haxx.se/docs/adv_20110623.html | Vendor Advisory | |
secalert@redhat.com | http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html | Mailing List, Third Party Advisory | |
secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062287.html | Mailing List, Third Party Advisory | |
secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061992.html | Mailing List, Third Party Advisory | |
secalert@redhat.com | http://secunia.com/advisories/45047 | Third Party Advisory | |
secalert@redhat.com | http://secunia.com/advisories/45067 | Third Party Advisory | |
secalert@redhat.com | http://secunia.com/advisories/45088 | Third Party Advisory | |
secalert@redhat.com | http://secunia.com/advisories/45144 | Third Party Advisory | |
secalert@redhat.com | http://secunia.com/advisories/45181 | Third Party Advisory | |
secalert@redhat.com | http://secunia.com/advisories/48256 | Third Party Advisory | |
secalert@redhat.com | http://security.gentoo.org/glsa/glsa-201203-02.xml | Third Party Advisory | |
secalert@redhat.com | http://support.apple.com/kb/HT5130 | Third Party Advisory | |
secalert@redhat.com | http://www.debian.org/security/2011/dsa-2271 | Third Party Advisory | |
secalert@redhat.com | http://www.mandriva.com/security/advisories?name=MDVSA-2011:116 | Third Party Advisory | |
secalert@redhat.com | http://www.redhat.com/support/errata/RHSA-2011-0918.html | Third Party Advisory | |
secalert@redhat.com | http://www.securitytracker.com/id?1025713 | Third Party Advisory, VDB Entry | |
secalert@redhat.com | http://www.ubuntu.com/usn/USN-1158-1 | Third Party Advisory | |
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=711454 | Issue Tracking, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://curl.haxx.se/curl-gssapi-delegation.patch | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | http://curl.haxx.se/docs/adv_20110623.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062287.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061992.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/45047 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/45067 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/45088 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/45144 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/45181 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/48256 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-201203-02.xml | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://support.apple.com/kb/HT5130 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2011/dsa-2271 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2011:116 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2011-0918.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1025713 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-1158-1 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=711454 | Issue Tracking, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
haxx | libcurl | * | |
apple | mac_os_x | * | |
fedoraproject | fedora | 14 | |
fedoraproject | fedora | 15 | |
debian | debian_linux | 5.0 | |
debian | debian_linux | 6.0 | |
debian | debian_linux | 7.0 | |
canonical | ubuntu_linux | 8.04 | |
canonical | ubuntu_linux | 10.04 | |
canonical | ubuntu_linux | 10.10 | |
canonical | ubuntu_linux | 11.04 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*", "matchCriteriaId": "B0E81972-6194-4EE4-89D4-9CEDF84BEAF3", "versionEndIncluding": "7.21.6", "versionStartIncluding": "7.10.6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "22675032-282C-4F77-B590-46F3FAD615C3", "versionEndExcluding": "10.7.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*", "matchCriteriaId": "BDE52846-24EC-4068-B788-EC7F915FFF11", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:15:*:*:*:*:*:*:*", "matchCriteriaId": "9396E005-22D8-4342-9323-C7DEA379191D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "8C757774-08E7-40AA-B532-6F705C8F7639", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "036E8A89-7A16-411F-9D31-676313BB7244", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*", "matchCriteriaId": "C91D2DBF-6DA7-4BA2-9F29-8BD2725A4701", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*", "matchCriteriaId": "5D37DF0F-F863-45AC-853A-3E04F9FEC7CA", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*", "matchCriteriaId": "87614B58-24AB-49FB-9C84-E8DDBA16353B", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*", "matchCriteriaId": "EF49D26F-142E-468B-87C1-BABEA445255C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Curl_input_negotiate function in http_negotiate.c in libcurl 7.10.6 through 7.21.6, as used in curl and other products, always performs credential delegation during GSSAPI authentication, which allows remote servers to impersonate clients via GSSAPI requests." }, { "lang": "es", "value": "La funci\u00f3n Curl_input_negotiate en http_negotiate.c en libcurl v7.10.6 \r\na v7.21.6, tal y como se utiliza en curl y otras aplicaciones, siempre lleva a cabo \r\ndelegaci\u00f3n de credenciales durante la autenticaci\u00f3n GSSAPI, lo que permite a \r\nhacerse pasar por clientes legitimos a servidores remotos a trav\u00e9s de peticiones GSSAPI." } ], "id": "CVE-2011-2192", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-07-07T21:55:02.320", "references": [ { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://curl.haxx.se/curl-gssapi-delegation.patch" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://curl.haxx.se/docs/adv_20110623.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062287.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061992.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/45047" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/45067" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/45088" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/45144" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/45181" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/48256" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://security.gentoo.org/glsa/glsa-201203-02.xml" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://support.apple.com/kb/HT5130" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2011/dsa-2271" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:116" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0918.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id?1025713" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-1158-1" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=711454" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://curl.haxx.se/curl-gssapi-delegation.patch" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://curl.haxx.se/docs/adv_20110623.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062287.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061992.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/45047" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/45067" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/45088" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/45144" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/45181" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/48256" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://security.gentoo.org/glsa/glsa-201203-02.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://support.apple.com/kb/HT5130" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2011/dsa-2271" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:116" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0918.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id?1025713" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-1158-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=711454" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-255" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-07-31 21:29
Modified
2024-11-21 02:59
Severity ?
3.7 (Low) - CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
9.8 (Critical) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
The URL percent-encoding decode function in libcurl before 7.51.0 is called `curl_easy_unescape`. Internally, even if this function would be made to allocate a unscape destination buffer larger than 2GB, it would return that new length in a signed 32 bit integer variable, thus the length would get either just truncated or both truncated and turned negative. That could then lead to libcurl writing outside of its heap based buffer.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html | ||
secalert@redhat.com | http://www.securityfocus.com/bid/94105 | Third Party Advisory, VDB Entry | |
secalert@redhat.com | http://www.securitytracker.com/id/1037192 | Third Party Advisory, VDB Entry | |
secalert@redhat.com | https://access.redhat.com/errata/RHSA-2018:2486 | Third Party Advisory | |
secalert@redhat.com | https://access.redhat.com/errata/RHSA-2018:3558 | ||
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8622 | Issue Tracking, Patch, Third Party Advisory | |
secalert@redhat.com | https://curl.haxx.se/docs/adv_20161102H.html | Patch, Vendor Advisory | |
secalert@redhat.com | https://security.gentoo.org/glsa/201701-47 | Third Party Advisory | |
secalert@redhat.com | https://www.tenable.com/security/tns-2016-21 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/94105 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1037192 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:2486 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:3558 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8622 | Issue Tracking, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://curl.haxx.se/docs/adv_20161102H.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/201701-47 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.tenable.com/security/tns-2016-21 | Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*", "matchCriteriaId": "09555548-2504-4BE0-97BE-91C99FF1F8AE", "versionEndExcluding": "7.51.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The URL percent-encoding decode function in libcurl before 7.51.0 is called `curl_easy_unescape`. Internally, even if this function would be made to allocate a unscape destination buffer larger than 2GB, it would return that new length in a signed 32 bit integer variable, thus the length would get either just truncated or both truncated and turned negative. That could then lead to libcurl writing outside of its heap based buffer." }, { "lang": "es", "value": "La funci\u00f3n URL percent-encoding en libcurl en versiones anteriores a la 7.51.0 se denomina \"curl_easy_unescape\". Internamente, aunque esta funci\u00f3n se haya hecho para asignar un b\u00fafer de destino no escapado m\u00e1s grande de 2GB, devuelve esa nueva longitud en una variable de enteros de 32 bits. Por lo tanto, la longitud se truncar\u00eda o se truncar\u00eda y, adem\u00e1s, se volver\u00eda negativa. Esto podr\u00eda conducir a que libcurl escriba fuera de su b\u00fafer basado en memoria din\u00e1mica (heap)." } ], "id": "CVE-2016-8622", "lastModified": "2024-11-21T02:59:41.960", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 1.4, "source": "secalert@redhat.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-07-31T21:29:00.317", "references": [ { "source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/94105" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1037192" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2486" }, { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2018:3558" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8622" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://curl.haxx.se/docs/adv_20161102H.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201701-47" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://www.tenable.com/security/tns-2016-21" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/94105" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1037192" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2486" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2018:3558" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8622" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://curl.haxx.se/docs/adv_20161102H.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201701-47" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.tenable.com/security/tns-2016-21" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-122" }, { "lang": "en", "value": "CWE-190" } ], "source": "secalert@redhat.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-04-24 14:59
Modified
2025-04-12 10:46
Severity ?
Summary
cURL and libcurl 7.10.6 through 7.41.0 does not properly re-use NTLM connections, which allows remote attackers to connect as other users via an unauthenticated request, a similar issue to CVE-2014-0015.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://advisories.mageia.org/MGASA-2015-0179.html | ||
secalert@redhat.com | http://curl.haxx.se/docs/adv_20150422A.html | Vendor Advisory | |
secalert@redhat.com | http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743 | ||
secalert@redhat.com | http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html | ||
secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155957.html | ||
secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156250.html | ||
secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156945.html | ||
secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157017.html | ||
secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157188.html | ||
secalert@redhat.com | http://lists.opensuse.org/opensuse-updates/2015-04/msg00057.html | ||
secalert@redhat.com | http://marc.info/?l=bugtraq&m=145612005512270&w=2 | Third Party Advisory | |
secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2015-1254.html | ||
secalert@redhat.com | http://www.debian.org/security/2015/dsa-3232 | ||
secalert@redhat.com | http://www.mandriva.com/security/advisories?name=MDVSA-2015:219 | ||
secalert@redhat.com | http://www.mandriva.com/security/advisories?name=MDVSA-2015:220 | ||
secalert@redhat.com | http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html | ||
secalert@redhat.com | http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html | ||
secalert@redhat.com | http://www.securityfocus.com/bid/74299 | ||
secalert@redhat.com | http://www.securitytracker.com/id/1032232 | ||
secalert@redhat.com | http://www.ubuntu.com/usn/USN-2591-1 | ||
secalert@redhat.com | https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763 | Vendor Advisory | |
secalert@redhat.com | https://security.gentoo.org/glsa/201509-02 | ||
secalert@redhat.com | https://support.apple.com/kb/HT205031 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://advisories.mageia.org/MGASA-2015-0179.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://curl.haxx.se/docs/adv_20150422A.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155957.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156250.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156945.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157017.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157188.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-updates/2015-04/msg00057.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=145612005512270&w=2 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2015-1254.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2015/dsa-3232 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2015:219 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2015:220 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/74299 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1032232 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-2591-1 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/201509-02 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT205031 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
haxx | curl | 7.10.6 | |
haxx | curl | 7.10.7 | |
haxx | curl | 7.10.8 | |
haxx | curl | 7.11.0 | |
haxx | curl | 7.11.1 | |
haxx | curl | 7.11.2 | |
haxx | curl | 7.12.0 | |
haxx | curl | 7.12.1 | |
haxx | curl | 7.12.2 | |
haxx | curl | 7.12.3 | |
haxx | curl | 7.13.0 | |
haxx | curl | 7.13.1 | |
haxx | curl | 7.13.2 | |
haxx | curl | 7.14.0 | |
haxx | curl | 7.14.1 | |
haxx | curl | 7.15.0 | |
haxx | curl | 7.15.1 | |
haxx | curl | 7.15.2 | |
haxx | curl | 7.15.3 | |
haxx | curl | 7.15.4 | |
haxx | curl | 7.15.5 | |
haxx | curl | 7.16.0 | |
haxx | curl | 7.16.1 | |
haxx | curl | 7.16.2 | |
haxx | curl | 7.16.3 | |
haxx | curl | 7.16.4 | |
haxx | curl | 7.17.0 | |
haxx | curl | 7.17.1 | |
haxx | curl | 7.18.0 | |
haxx | curl | 7.18.1 | |
haxx | curl | 7.18.2 | |
haxx | curl | 7.19.0 | |
haxx | curl | 7.19.1 | |
haxx | curl | 7.19.2 | |
haxx | curl | 7.19.3 | |
haxx | curl | 7.19.4 | |
haxx | curl | 7.19.5 | |
haxx | curl | 7.19.6 | |
haxx | curl | 7.19.7 | |
haxx | curl | 7.20.0 | |
haxx | curl | 7.20.1 | |
haxx | curl | 7.21.0 | |
haxx | curl | 7.21.1 | |
haxx | curl | 7.21.2 | |
haxx | curl | 7.21.3 | |
haxx | curl | 7.21.4 | |
haxx | curl | 7.21.5 | |
haxx | curl | 7.21.6 | |
haxx | curl | 7.21.7 | |
haxx | curl | 7.22.0 | |
haxx | curl | 7.23.0 | |
haxx | curl | 7.23.1 | |
haxx | curl | 7.24.0 | |
haxx | curl | 7.25.0 | |
haxx | curl | 7.26.0 | |
haxx | curl | 7.27.0 | |
haxx | curl | 7.28.0 | |
haxx | curl | 7.28.1 | |
haxx | curl | 7.29.0 | |
haxx | curl | 7.30.0 | |
haxx | curl | 7.31.0 | |
haxx | curl | 7.32.0 | |
haxx | curl | 7.33.0 | |
haxx | curl | 7.34.0 | |
haxx | curl | 7.35.0 | |
haxx | curl | 7.36.0 | |
haxx | curl | 7.37.1 | |
haxx | curl | 7.38.0 | |
haxx | curl | 7.39.0 | |
haxx | curl | 7.40.0 | |
haxx | curl | 7.41.0 | |
canonical | ubuntu_linux | 12.04 | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 14.10 | |
canonical | ubuntu_linux | 15.04 | |
debian | debian_linux | 7.0 | |
haxx | libcurl | 7.10.6 | |
haxx | libcurl | 7.10.7 | |
haxx | libcurl | 7.10.8 | |
haxx | libcurl | 7.11.0 | |
haxx | libcurl | 7.11.1 | |
haxx | libcurl | 7.11.2 | |
haxx | libcurl | 7.12.0 | |
haxx | libcurl | 7.12.1 | |
haxx | libcurl | 7.12.2 | |
haxx | libcurl | 7.12.3 | |
haxx | libcurl | 7.13.0 | |
haxx | libcurl | 7.13.1 | |
haxx | libcurl | 7.13.2 | |
haxx | libcurl | 7.14.0 | |
haxx | libcurl | 7.14.1 | |
haxx | libcurl | 7.15.0 | |
haxx | libcurl | 7.15.1 | |
haxx | libcurl | 7.15.2 | |
haxx | libcurl | 7.15.3 | |
haxx | libcurl | 7.15.4 | |
haxx | libcurl | 7.15.5 | |
haxx | libcurl | 7.16.0 | |
haxx | libcurl | 7.16.1 | |
haxx | libcurl | 7.16.2 | |
haxx | libcurl | 7.16.3 | |
haxx | libcurl | 7.16.4 | |
haxx | libcurl | 7.17.0 | |
haxx | libcurl | 7.17.1 | |
haxx | libcurl | 7.18.0 | |
haxx | libcurl | 7.18.1 | |
haxx | libcurl | 7.18.2 | |
haxx | libcurl | 7.19.0 | |
haxx | libcurl | 7.19.1 | |
haxx | libcurl | 7.19.2 | |
haxx | libcurl | 7.19.3 | |
haxx | libcurl | 7.19.4 | |
haxx | libcurl | 7.19.5 | |
haxx | libcurl | 7.19.6 | |
haxx | libcurl | 7.19.7 | |
haxx | libcurl | 7.20.0 | |
haxx | libcurl | 7.20.1 | |
haxx | libcurl | 7.21.0 | |
haxx | libcurl | 7.21.1 | |
haxx | libcurl | 7.21.2 | |
haxx | libcurl | 7.21.3 | |
haxx | libcurl | 7.21.4 | |
haxx | libcurl | 7.21.5 | |
haxx | libcurl | 7.21.6 | |
haxx | libcurl | 7.21.7 | |
haxx | libcurl | 7.22.0 | |
haxx | libcurl | 7.23.0 | |
haxx | libcurl | 7.23.1 | |
haxx | libcurl | 7.24.0 | |
haxx | libcurl | 7.25.0 | |
haxx | libcurl | 7.26.0 | |
haxx | libcurl | 7.27.0 | |
haxx | libcurl | 7.28.0 | |
haxx | libcurl | 7.28.1 | |
haxx | libcurl | 7.29.0 | |
haxx | libcurl | 7.30.0 | |
haxx | libcurl | 7.31.0 | |
haxx | libcurl | 7.32.0 | |
haxx | libcurl | 7.33.0 | |
haxx | libcurl | 7.34.0 | |
haxx | libcurl | 7.35.0 | |
haxx | libcurl | 7.36.0 | |
haxx | libcurl | 7.37.0 | |
haxx | libcurl | 7.37.1 | |
haxx | libcurl | 7.38.0 | |
haxx | libcurl | 7.39 | |
haxx | libcurl | 7.40.0 | |
haxx | libcurl | 7.41.0 | |
hp | system_management_homepage | * | |
apple | mac_os_x | * | |
apple | mac_os_x | 10.10.0 | |
apple | mac_os_x | 10.10.1 | |
apple | mac_os_x | 10.10.2 | |
apple | mac_os_x | 10.10.3 | |
apple | mac_os_x | 10.10.4 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:haxx:curl:7.10.6:*:*:*:*:*:*:*", "matchCriteriaId": "5D65CDC0-580B-42B3-97E8-69BE44CDB68C", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.10.7:*:*:*:*:*:*:*", "matchCriteriaId": "01001EEA-AB99-4041-8188-38CEBE9C3031", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.10.8:*:*:*:*:*:*:*", "matchCriteriaId": "31DB0DA3-88B7-43ED-8102-CEBC28524CE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "87596B6A-A7B3-4256-9982-45D3B6E3E018", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "0045855F-A707-415A-AC12-6981B68B08E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.11.2:*:*:*:*:*:*:*", "matchCriteriaId": "B49807DC-0BDA-41F6-BB76-7C62328D245F", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "0A78B6B8-9F4B-46AC-BB04-7EBADC690CBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "EFE80B46-33F0-4338-AF37-9E7E31FC5E83", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.12.2:*:*:*:*:*:*:*", "matchCriteriaId": "DD38D8C6-9EEE-4160-9353-773943A560B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.12.3:*:*:*:*:*:*:*", "matchCriteriaId": "FD33549E-EFFB-466F-8B47-BE036D454693", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.13.0:*:*:*:*:*:*:*", "matchCriteriaId": "16BB71C8-3564-4E69-A2C3-E9AB1F9EF20C", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.13.1:*:*:*:*:*:*:*", "matchCriteriaId": "4966AA12-15DB-44E5-84AF-9D7AF4A52F86", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.13.2:*:*:*:*:*:*:*", "matchCriteriaId": "827B6C8A-59C4-4714-9406-5C8EB5073AB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.14.0:*:*:*:*:*:*:*", "matchCriteriaId": "93A11305-E4FF-473B-9415-AF1F0E7A27D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.14.1:*:*:*:*:*:*:*", "matchCriteriaId": "8444095B-AF8F-42B5-BD4D-9CBE9238E42D", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.15.0:*:*:*:*:*:*:*", "matchCriteriaId": "C22F23AE-02AB-42F0-AA16-D2F8C94E5DE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B33DE520-BD2A-4499-B1F8-1439AE16AB57", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.15.2:*:*:*:*:*:*:*", "matchCriteriaId": "041FCB20-E74F-4550-AC48-EE4E5875E118", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.15.3:*:*:*:*:*:*:*", "matchCriteriaId": "D16DBA5E-582F-4648-932E-8A1EFB7FE3D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.15.4:*:*:*:*:*:*:*", "matchCriteriaId": "A25323F4-7C67-4097-AD53-A6B9E6D96BA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.15.5:*:*:*:*:*:*:*", "matchCriteriaId": "36919682-F59E-4EC0-886C-AE967F636753", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.16.0:*:*:*:*:*:*:*", "matchCriteriaId": "B45AF234-3651-4367-BFEF-8766F66FB138", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.16.1:*:*:*:*:*:*:*", "matchCriteriaId": "E46A9126-A02E-44CD-885D-0956E0C87C2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.16.2:*:*:*:*:*:*:*", "matchCriteriaId": "91E9C756-7FE3-4197-8C18-99CD1F49B0D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.16.3:*:*:*:*:*:*:*", "matchCriteriaId": "88806B7D-5EFE-4F91-B115-732882D2C126", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.16.4:*:*:*:*:*:*:*", "matchCriteriaId": "5BB9E8AB-B3EC-4743-B39B-7325EEB17233", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.17.0:*:*:*:*:*:*:*", "matchCriteriaId": "5030FBB0-C95B-4ADE-BFC2-CCA37AAD019B", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.17.1:*:*:*:*:*:*:*", "matchCriteriaId": "5513618A-6770-4292-95D1-68F55D8343CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.18.0:*:*:*:*:*:*:*", "matchCriteriaId": "7494C01F-E9EC-406E-879A-B2045865E282", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.18.1:*:*:*:*:*:*:*", "matchCriteriaId": "7DD9F894-4576-4ED1-9F55-4C27ECE7E058", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.18.2:*:*:*:*:*:*:*", "matchCriteriaId": "49AFACAC-BBAF-469B-BF05-0478E987120F", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.19.0:*:*:*:*:*:*:*", "matchCriteriaId": "6A136E86-0697-4915-BC49-F570C776EDE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.19.1:*:*:*:*:*:*:*", "matchCriteriaId": "ECB241AF-A01D-4FD6-B98A-F4C20F844C2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.19.2:*:*:*:*:*:*:*", "matchCriteriaId": "C5B61901-F7DF-4805-8EB7-CA1701CA81CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.19.3:*:*:*:*:*:*:*", "matchCriteriaId": "EB0CDEC9-224A-4668-B2E4-2145653E3F2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.19.4:*:*:*:*:*:*:*", "matchCriteriaId": "E92BE9CB-F001-47A0-94E0-48FC01A63FE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.19.5:*:*:*:*:*:*:*", "matchCriteriaId": "324E2A20-2F66-4E03-9A7F-A09E631E9033", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.19.6:*:*:*:*:*:*:*", "matchCriteriaId": "C8987B53-BD80-40B9-8429-21AD97208040", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.19.7:*:*:*:*:*:*:*", "matchCriteriaId": "490D1BDC-33B9-43BA-B6DA-42DEE577082A", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "B465BE7E-0B4D-4BC4-894B-3F51A201CE91", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.20.1:*:*:*:*:*:*:*", "matchCriteriaId": "CAA17087-3021-4961-B53C-CDCC872A31A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.21.0:*:*:*:*:*:*:*", "matchCriteriaId": "E5CA3936-4602-40E6-B75C-58D3F24268E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.21.1:*:*:*:*:*:*:*", "matchCriteriaId": "D87C110C-21DD-438A-90EF-BE516CF59F3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.21.2:*:*:*:*:*:*:*", "matchCriteriaId": "AD2D9E0E-2EED-4FB5-859C-05226FC48D7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.21.3:*:*:*:*:*:*:*", "matchCriteriaId": "7CA01E21-71CE-4B07-B5A6-D0D7AC493A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.21.4:*:*:*:*:*:*:*", "matchCriteriaId": "51239254-31CE-4BF7-8669-1525BA391362", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.21.5:*:*:*:*:*:*:*", "matchCriteriaId": "2E2BE20D-232D-4C86-81B0-C82CCC1CAA62", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.21.6:*:*:*:*:*:*:*", "matchCriteriaId": "D652FD7C-1521-4391-AAE1-0A4D6F4CE8F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.21.7:*:*:*:*:*:*:*", "matchCriteriaId": "DB861143-F809-45CF-95BE-E64F4BA1A0DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.22.0:*:*:*:*:*:*:*", "matchCriteriaId": "E3480F4A-0AE0-4428-9EDA-5A6B994909A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.23.0:*:*:*:*:*:*:*", "matchCriteriaId": "936BF59E-33A8-46BA-9FBD-8763812E2F10", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.23.1:*:*:*:*:*:*:*", "matchCriteriaId": "33168C81-6DAE-40D6-9693-68390CD71DA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.24.0:*:*:*:*:*:*:*", "matchCriteriaId": "424F9604-AA9A-4D45-A521-0BDEDB723659", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.25.0:*:*:*:*:*:*:*", "matchCriteriaId": "DC6EBCEB-E52C-4FF5-B15A-6960F58090EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.26.0:*:*:*:*:*:*:*", "matchCriteriaId": "D204E994-4591-403C-8EF3-D3B7BF4AA1A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.27.0:*:*:*:*:*:*:*", "matchCriteriaId": "EBF5418D-1162-4B1E-BC3D-06A3E084BEFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.28.0:*:*:*:*:*:*:*", "matchCriteriaId": "1CA65F31-3D54-4F66-A0A3-2BD993FF38F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.28.1:*:*:*:*:*:*:*", "matchCriteriaId": "41ACC9FE-62FF-424B-B4B8-B033FEAF7686", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.29.0:*:*:*:*:*:*:*", "matchCriteriaId": "F8BC39E9-5945-4DC8-ACA8-1C9918D9F279", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.30.0:*:*:*:*:*:*:*", "matchCriteriaId": "B9658447-FBB0-4DEA-8FEE-BD4D3D1BF7FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.31.0:*:*:*:*:*:*:*", "matchCriteriaId": "5ECABFCB-0D02-4B5B-BB35-C6B3C0896348", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.32.0:*:*:*:*:*:*:*", "matchCriteriaId": "5A5176F0-E62F-46FF-B536-DC0680696773", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.33.0:*:*:*:*:*:*:*", "matchCriteriaId": "506A3761-3D24-43DB-88D8-4EB5B9E8BA5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.34.0:*:*:*:*:*:*:*", "matchCriteriaId": "0B6EF8B0-0E86-449C-A500-ACD902A78C7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.35.0:*:*:*:*:*:*:*", "matchCriteriaId": "4D558CC2-0146-4887-834E-19FCB1D512A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.36.0:*:*:*:*:*:*:*", "matchCriteriaId": "6931764D-16AB-4546-9CE3-5B4E03BC984A", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.37.1:*:*:*:*:*:*:*", "matchCriteriaId": "B27C2E02-5C0A-4A12-B0A6-5B1C0DFA94E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.38.0:*:*:*:*:*:*:*", "matchCriteriaId": "EFC7535F-B8C7-490F-A2F9-1DCFD41A3C9B", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.39.0:*:*:*:*:*:*:*", "matchCriteriaId": "3CCBFE6D-F6A9-4394-9AF8-F830DC7E6A81", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.40.0:*:*:*:*:*:*:*", "matchCriteriaId": "5DEBBFCA-6A18-4F8F-B841-50255C952FA0", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.41.0:*:*:*:*:*:*:*", "matchCriteriaId": "FEEAE437-A645-468B-B283-44799658F534", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*", "matchCriteriaId": "49A63F39-30BE-443F-AF10-6245587D3359", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*", "matchCriteriaId": "F38D3B7E-8429-473F-BB31-FC3583EE5A5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:haxx:libcurl:7.10.6:*:*:*:*:*:*:*", "matchCriteriaId": "2E1F9453-1FB6-4CA7-9285-A243E56667B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.10.7:*:*:*:*:*:*:*", "matchCriteriaId": "F79828BB-2412-46AD-BE3C-A51B48E191AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.10.8:*:*:*:*:*:*:*", "matchCriteriaId": "72D0F13F-D56F-4C1C-A3CF-2E4E704817CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "90A4F2E2-1B43-470E-8935-CB32F12A0124", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "797DF5C7-509E-48FD-BD04-C66E01748728", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.11.2:*:*:*:*:*:*:*", "matchCriteriaId": "47BD868A-CE3B-4E39-A588-C4EDA3265A71", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "4A2EE400-1C36-40F4-A9D1-9AB432F168BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "06E3CB14-FB16-4F4E-9AD9-A02DC727FF6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.12.2:*:*:*:*:*:*:*", "matchCriteriaId": "08DCC42C-C881-4AEA-9348-E8317C54D62B", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.12.3:*:*:*:*:*:*:*", "matchCriteriaId": "2BC4EF5A-C8CB-4F33-B4D1-E4192B179D26", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.13.0:*:*:*:*:*:*:*", "matchCriteriaId": "81CEF54A-9668-4031-926F-9B978DD5CDF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.13.1:*:*:*:*:*:*:*", "matchCriteriaId": "45068C90-8915-4D19-B36B-993980E28D08", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.13.2:*:*:*:*:*:*:*", "matchCriteriaId": "24543011-2458-47B5-984A-901E70084902", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.14.0:*:*:*:*:*:*:*", "matchCriteriaId": "FB482A9C-D577-4AEE-A08F-CAFA6586B51E", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.14.1:*:*:*:*:*:*:*", "matchCriteriaId": "65AF9B86-A555-4D5E-B24E-9EBF78BCD8CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.15.0:*:*:*:*:*:*:*", "matchCriteriaId": "60BBDF07-DB97-433E-B542-EFEBE45550DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.15.1:*:*:*:*:*:*:*", "matchCriteriaId": "CA8BE3F8-82ED-4DD7-991E-979E950C98B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.15.2:*:*:*:*:*:*:*", "matchCriteriaId": "738AA231-4694-46E8-B559-1594263A9987", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.15.3:*:*:*:*:*:*:*", "matchCriteriaId": "E9E1F171-B887-499A-BF4F-538EBF347811", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.15.4:*:*:*:*:*:*:*", "matchCriteriaId": "07AA276A-0EBA-4DC9-951C-8F8159FAC7A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.15.5:*:*:*:*:*:*:*", "matchCriteriaId": "8DEEF534-9AD2-4439-9D69-E91D062C4647", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.16.0:*:*:*:*:*:*:*", "matchCriteriaId": "63643BE1-C978-4CD2-8ED1-2B979DB0676E", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.16.1:*:*:*:*:*:*:*", "matchCriteriaId": "F6FA04A0-9258-4654-ABCF-F41340B1FA35", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.16.2:*:*:*:*:*:*:*", "matchCriteriaId": "DE829230-AFDB-4131-9C6A-D9D7A66C5B57", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.16.3:*:*:*:*:*:*:*", "matchCriteriaId": "B7E8BA30-8087-48D4-AE1B-48326FF826B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.16.4:*:*:*:*:*:*:*", "matchCriteriaId": "47970EFF-2F51-4875-A6BD-E30614E13278", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.17.0:*:*:*:*:*:*:*", "matchCriteriaId": "52C9B668-3204-41C5-A82E-262BDFA541DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*", "matchCriteriaId": "08C8EE1E-E186-42D6-8B12-05865C73F261", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*", "matchCriteriaId": "EEA3D88B-41B9-4D79-B47D-B3D6058C0C27", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.18.1:*:*:*:*:*:*:*", "matchCriteriaId": "C2C80901-D48E-4C2A-9BED-A40007A11C97", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*", "matchCriteriaId": "331A51E4-AA73-486F-9618-5A83965F2436", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.0:*:*:*:*:*:*:*", "matchCriteriaId": "EB32DF2C-9208-4853-ADEB-B00D764D7467", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.1:*:*:*:*:*:*:*", "matchCriteriaId": "E05636DC-7E38-4605-AAB8-81C0AE37520A", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.2:*:*:*:*:*:*:*", "matchCriteriaId": "624DF2F1-53FD-48D3-B93D-44E99C9C0C5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*", "matchCriteriaId": "F2171C7C-311A-4405-B95F-3A54966FA844", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.4:*:*:*:*:*:*:*", "matchCriteriaId": "5DE20A41-8B53-46FC-9002-69CC7495171F", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.5:*:*:*:*:*:*:*", "matchCriteriaId": "87ED9DA0-E880-4CBB-B1AC-5AEE8A004718", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.6:*:*:*:*:*:*:*", "matchCriteriaId": "5293C7F0-BF9F-4768-889A-876CE78903CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.7:*:*:*:*:*:*:*", "matchCriteriaId": "F3EB41B3-65F3-4B0E-8CCC-325B14AF605B", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "857B244C-2AFB-40C7-A893-7C6DE9871BCE", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.20.1:*:*:*:*:*:*:*", "matchCriteriaId": "B732CE55-820A-40E0-A885-71BBB6CF8C15", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.0:*:*:*:*:*:*:*", "matchCriteriaId": "0455A5F2-1515-4CD8-BA2F-74D28E91A661", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.1:*:*:*:*:*:*:*", "matchCriteriaId": "29034B3A-BE9D-4D68-8C56-4465C03C3693", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*", "matchCriteriaId": "6249538E-FBCB-4130-91FB-DA78D7BA45DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.3:*:*:*:*:*:*:*", "matchCriteriaId": "5E11B8A5-50A2-468F-BFB3-86DD9D28AC73", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.4:*:*:*:*:*:*:*", "matchCriteriaId": "9EAE25A0-3828-46F1-AB30-88732CBC9F38", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.5:*:*:*:*:*:*:*", "matchCriteriaId": "1533A85C-2160-445D-8787-E624AEDC5A0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.6:*:*:*:*:*:*:*", "matchCriteriaId": "D87B9393-7EA4-43DA-900C-7E840AE2D4C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.7:*:*:*:*:*:*:*", "matchCriteriaId": "7D1249E9-304F-4952-8DAB-8B79CE5E7D54", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*", "matchCriteriaId": "83FAF953-6A65-4FAB-BDB5-03B468CD1C9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*", "matchCriteriaId": "29F8FF1F-A639-4161-9366-62528AAF4C07", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.23.1:*:*:*:*:*:*:*", "matchCriteriaId": "812AB429-379A-4EDE-9664-5BC2989053F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.24.0:*:*:*:*:*:*:*", "matchCriteriaId": "13DD791F-C4BD-4456-955A-92E84082AA09", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.25.0:*:*:*:*:*:*:*", "matchCriteriaId": "4A17E442-45AA-4780-98B4-9BF764DCC1C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*", "matchCriteriaId": "F6AF544C-5F16-4434-B9FB-93B1B7318950", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*", "matchCriteriaId": "CBFD9ED9-2412-44AE-9C55-0ED03A121B23", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*", "matchCriteriaId": "67CCE31B-ABDA-4F32-BAF1-B1AD0664B3E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*", "matchCriteriaId": "9E66A332-ECD1-4452-B444-FB629022FDF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.29.0:*:*:*:*:*:*:*", "matchCriteriaId": "CDD3D599-35E9-4590-B5E0-3AF04D344695", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.30.0:*:*:*:*:*:*:*", "matchCriteriaId": "A3B6BFFB-7967-482C-9B49-4BD25C815299", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*", "matchCriteriaId": "1791BF6D-2C96-4A6E-90D4-2906A73601F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*", "matchCriteriaId": "260DD751-4145-4B75-B892-5FC932C6A305", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*", "matchCriteriaId": "EFF4AD0D-2EC5-4CE8-B6B3-2EC8ED2FF118", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*", "matchCriteriaId": "3EB1CB85-0A9B-4816-B471-278774EE6D4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*", "matchCriteriaId": "3831AB03-4E7E-476D-9623-58AADC188DFE", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*", "matchCriteriaId": "ABACE305-2F0C-4B59-BC5C-6DF162B450E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*", "matchCriteriaId": "6FAC1B55-F492-484E-B837-E7745682DE0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.37.1:*:*:*:*:*:*:*", "matchCriteriaId": "E0D57914-B40A-462B-9C78-6433BE2B2DB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.38.0:*:*:*:*:*:*:*", "matchCriteriaId": "A9A12DF7-62C5-46AD-9236-E2821C64156E", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.39:*:*:*:*:*:*:*", "matchCriteriaId": "4C43697D-390A-4AC0-A5D8-62B6D22245BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.40.0:*:*:*:*:*:*:*", "matchCriteriaId": "D52E9E9F-7A35-4CB9-813E-5A1D4A36415C", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.41.0:*:*:*:*:*:*:*", "matchCriteriaId": "257291FB-969C-4413-BA81-806B5E1B40A7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hp:system_management_homepage:*:*:*:*:*:*:*:*", "matchCriteriaId": "D06BF4CE-299F-42E4-BA0A-5D68788C92DF", "versionEndIncluding": "7.5.3.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "9C3A0363-F05A-49C3-A9D2-E4F31B60CD4D", "versionEndIncluding": "10.9.5", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "C8A2286E-9D1C-4B56-8B40-150201B818AF", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "0AF9BC68-7F0D-4DF9-9CD8-6CE9844555C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.10.2:*:*:*:*:*:*:*", "matchCriteriaId": "D35FAC77-A0DD-4AF9-AA9E-A4B170842D2D", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.10.3:*:*:*:*:*:*:*", "matchCriteriaId": "831B1114-7CA7-43E3-9A15-592218060A1F", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.10.4:*:*:*:*:*:*:*", "matchCriteriaId": "E8B0A12E-E122-4189-A05E-4FEA43C19876", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "cURL and libcurl 7.10.6 through 7.41.0 does not properly re-use NTLM connections, which allows remote attackers to connect as other users via an unauthenticated request, a similar issue to CVE-2014-0015." }, { "lang": "es", "value": "cURL y libcurl 7.10.6 hasta 7.41.0 no reutilizan correctamente las conexiones NTLM, lo que permite a atacantes remotos conectar como otros usuarios a trav\u00e9s de una solicitud no autenticada, un problema similar a CVE-2014-0015." } ], "id": "CVE-2015-3143", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-04-24T14:59:08.187", "references": [ { "source": "secalert@redhat.com", "url": "http://advisories.mageia.org/MGASA-2015-0179.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://curl.haxx.se/docs/adv_20150422A.html" }, { "source": "secalert@redhat.com", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10743" }, { "source": "secalert@redhat.com", "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155957.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156250.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156945.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157017.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157188.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00057.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=145612005512270\u0026w=2" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2015-1254.html" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2015/dsa-3232" }, { "source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:219" }, { "source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:220" }, { "source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/74299" }, { "source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id/1032232" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/USN-2591-1" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763" }, { "source": "secalert@redhat.com", "url": "https://security.gentoo.org/glsa/201509-02" }, { "source": "secalert@redhat.com", "url": "https://support.apple.com/kb/HT205031" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://advisories.mageia.org/MGASA-2015-0179.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://curl.haxx.se/docs/adv_20150422A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10743" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155957.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156250.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156945.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157017.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157188.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00057.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=145612005512270\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2015-1254.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2015/dsa-3232" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:219" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:220" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/74299" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1032232" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-2591-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201509-02" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.apple.com/kb/HT205031" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-04-15 14:55
Modified
2025-04-12 10:46
Severity ?
Summary
cURL and libcurl 7.1 before 7.36.0, when using the OpenSSL, axtls, qsossl or gskit libraries for TLS, recognize a wildcard IP address in the subject's Common Name (CN) field of an X.509 certificate, which might allow man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://advisories.mageia.org/MGASA-2015-0165.html | ||
secalert@redhat.com | http://curl.haxx.se/docs/adv_20140326B.html | Vendor Advisory | |
secalert@redhat.com | http://lists.opensuse.org/opensuse-updates/2014-04/msg00042.html | ||
secalert@redhat.com | http://secunia.com/advisories/57836 | ||
secalert@redhat.com | http://secunia.com/advisories/57966 | ||
secalert@redhat.com | http://secunia.com/advisories/57968 | ||
secalert@redhat.com | http://secunia.com/advisories/58615 | ||
secalert@redhat.com | http://secunia.com/advisories/59458 | ||
secalert@redhat.com | http://www-01.ibm.com/support/docview.wss?uid=swg21675820 | ||
secalert@redhat.com | http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095862 | ||
secalert@redhat.com | http://www.debian.org/security/2014/dsa-2902 | ||
secalert@redhat.com | http://www.getchef.com/blog/2014/04/09/chef-server-11-0-12-release/ | ||
secalert@redhat.com | http://www.getchef.com/blog/2014/04/09/enterprise-chef-1-4-9-release/ | ||
secalert@redhat.com | http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/ | ||
secalert@redhat.com | http://www.mandriva.com/security/advisories?name=MDVSA-2015:213 | ||
secalert@redhat.com | http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html | ||
secalert@redhat.com | http://www.ubuntu.com/usn/USN-2167-1 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://advisories.mageia.org/MGASA-2015-0165.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://curl.haxx.se/docs/adv_20140326B.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-updates/2014-04/msg00042.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/57836 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/57966 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/57968 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/58615 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/59458 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www-01.ibm.com/support/docview.wss?uid=swg21675820 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095862 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2014/dsa-2902 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.getchef.com/blog/2014/04/09/chef-server-11-0-12-release/ | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.getchef.com/blog/2014/04/09/enterprise-chef-1-4-9-release/ | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/ | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2015:213 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-2167-1 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
haxx | curl | 7.10.6 | |
haxx | curl | 7.10.7 | |
haxx | curl | 7.10.8 | |
haxx | curl | 7.11.0 | |
haxx | curl | 7.11.1 | |
haxx | curl | 7.11.2 | |
haxx | curl | 7.12.0 | |
haxx | curl | 7.12.1 | |
haxx | curl | 7.12.2 | |
haxx | curl | 7.12.3 | |
haxx | curl | 7.13.0 | |
haxx | curl | 7.13.1 | |
haxx | curl | 7.13.2 | |
haxx | curl | 7.14.0 | |
haxx | curl | 7.14.1 | |
haxx | curl | 7.15.0 | |
haxx | curl | 7.15.1 | |
haxx | curl | 7.15.2 | |
haxx | curl | 7.15.3 | |
haxx | curl | 7.15.4 | |
haxx | curl | 7.15.5 | |
haxx | curl | 7.16.0 | |
haxx | curl | 7.16.1 | |
haxx | curl | 7.16.2 | |
haxx | curl | 7.16.3 | |
haxx | curl | 7.16.4 | |
haxx | curl | 7.17.0 | |
haxx | curl | 7.17.1 | |
haxx | curl | 7.18.0 | |
haxx | curl | 7.18.1 | |
haxx | curl | 7.18.2 | |
haxx | curl | 7.19.0 | |
haxx | curl | 7.19.1 | |
haxx | curl | 7.19.2 | |
haxx | curl | 7.19.3 | |
haxx | curl | 7.19.4 | |
haxx | curl | 7.19.5 | |
haxx | curl | 7.19.6 | |
haxx | curl | 7.19.7 | |
haxx | curl | 7.20.0 | |
haxx | curl | 7.20.1 | |
haxx | curl | 7.21.0 | |
haxx | curl | 7.21.1 | |
haxx | curl | 7.21.2 | |
haxx | curl | 7.21.3 | |
haxx | curl | 7.21.4 | |
haxx | curl | 7.21.5 | |
haxx | curl | 7.21.6 | |
haxx | curl | 7.21.7 | |
haxx | curl | 7.22.0 | |
haxx | curl | 7.23.0 | |
haxx | curl | 7.23.1 | |
haxx | curl | 7.24.0 | |
haxx | curl | 7.25.0 | |
haxx | curl | 7.26.0 | |
haxx | curl | 7.27.0 | |
haxx | curl | 7.28.0 | |
haxx | curl | 7.28.1 | |
haxx | curl | 7.29.0 | |
haxx | curl | 7.30.0 | |
haxx | curl | 7.31.0 | |
haxx | curl | 7.32.0 | |
haxx | curl | 7.33.0 | |
haxx | curl | 7.34.0 | |
haxx | curl | 7.35.0 | |
haxx | libcurl | 7.10.6 | |
haxx | libcurl | 7.10.7 | |
haxx | libcurl | 7.10.8 | |
haxx | libcurl | 7.11.0 | |
haxx | libcurl | 7.11.1 | |
haxx | libcurl | 7.11.2 | |
haxx | libcurl | 7.12.0 | |
haxx | libcurl | 7.12.1 | |
haxx | libcurl | 7.12.2 | |
haxx | libcurl | 7.12.3 | |
haxx | libcurl | 7.13.0 | |
haxx | libcurl | 7.13.1 | |
haxx | libcurl | 7.13.2 | |
haxx | libcurl | 7.14.0 | |
haxx | libcurl | 7.14.1 | |
haxx | libcurl | 7.15.0 | |
haxx | libcurl | 7.15.1 | |
haxx | libcurl | 7.15.2 | |
haxx | libcurl | 7.15.3 | |
haxx | libcurl | 7.15.4 | |
haxx | libcurl | 7.15.5 | |
haxx | libcurl | 7.16.0 | |
haxx | libcurl | 7.16.1 | |
haxx | libcurl | 7.16.2 | |
haxx | libcurl | 7.16.3 | |
haxx | libcurl | 7.16.4 | |
haxx | libcurl | 7.17.0 | |
haxx | libcurl | 7.17.1 | |
haxx | libcurl | 7.18.0 | |
haxx | libcurl | 7.18.1 | |
haxx | libcurl | 7.18.2 | |
haxx | libcurl | 7.19.0 | |
haxx | libcurl | 7.19.1 | |
haxx | libcurl | 7.19.2 | |
haxx | libcurl | 7.19.3 | |
haxx | libcurl | 7.19.4 | |
haxx | libcurl | 7.19.5 | |
haxx | libcurl | 7.19.6 | |
haxx | libcurl | 7.19.7 | |
haxx | libcurl | 7.20.0 | |
haxx | libcurl | 7.20.1 | |
haxx | libcurl | 7.21.0 | |
haxx | libcurl | 7.21.1 | |
haxx | libcurl | 7.21.2 | |
haxx | libcurl | 7.21.3 | |
haxx | libcurl | 7.21.4 | |
haxx | libcurl | 7.21.5 | |
haxx | libcurl | 7.21.6 | |
haxx | libcurl | 7.21.7 | |
haxx | libcurl | 7.22.0 | |
haxx | libcurl | 7.23.0 | |
haxx | libcurl | 7.23.1 | |
haxx | libcurl | 7.24.0 | |
haxx | libcurl | 7.25.0 | |
haxx | libcurl | 7.26.0 | |
haxx | libcurl | 7.27.0 | |
haxx | libcurl | 7.28.0 | |
haxx | libcurl | 7.28.1 | |
haxx | libcurl | 7.29.0 | |
haxx | libcurl | 7.30.0 | |
haxx | libcurl | 7.31.0 | |
haxx | libcurl | 7.32.0 | |
haxx | libcurl | 7.33.0 | |
haxx | libcurl | 7.34.0 | |
haxx | libcurl | 7.35.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:haxx:curl:7.10.6:*:*:*:*:*:*:*", "matchCriteriaId": "5D65CDC0-580B-42B3-97E8-69BE44CDB68C", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.10.7:*:*:*:*:*:*:*", "matchCriteriaId": "01001EEA-AB99-4041-8188-38CEBE9C3031", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.10.8:*:*:*:*:*:*:*", "matchCriteriaId": "31DB0DA3-88B7-43ED-8102-CEBC28524CE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "87596B6A-A7B3-4256-9982-45D3B6E3E018", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "0045855F-A707-415A-AC12-6981B68B08E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.11.2:*:*:*:*:*:*:*", "matchCriteriaId": "B49807DC-0BDA-41F6-BB76-7C62328D245F", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "0A78B6B8-9F4B-46AC-BB04-7EBADC690CBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "EFE80B46-33F0-4338-AF37-9E7E31FC5E83", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.12.2:*:*:*:*:*:*:*", "matchCriteriaId": "DD38D8C6-9EEE-4160-9353-773943A560B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.12.3:*:*:*:*:*:*:*", "matchCriteriaId": "FD33549E-EFFB-466F-8B47-BE036D454693", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.13.0:*:*:*:*:*:*:*", "matchCriteriaId": "16BB71C8-3564-4E69-A2C3-E9AB1F9EF20C", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.13.1:*:*:*:*:*:*:*", "matchCriteriaId": "4966AA12-15DB-44E5-84AF-9D7AF4A52F86", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.13.2:*:*:*:*:*:*:*", "matchCriteriaId": "827B6C8A-59C4-4714-9406-5C8EB5073AB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.14.0:*:*:*:*:*:*:*", "matchCriteriaId": "93A11305-E4FF-473B-9415-AF1F0E7A27D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.14.1:*:*:*:*:*:*:*", "matchCriteriaId": "8444095B-AF8F-42B5-BD4D-9CBE9238E42D", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.15.0:*:*:*:*:*:*:*", "matchCriteriaId": "C22F23AE-02AB-42F0-AA16-D2F8C94E5DE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B33DE520-BD2A-4499-B1F8-1439AE16AB57", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.15.2:*:*:*:*:*:*:*", "matchCriteriaId": "041FCB20-E74F-4550-AC48-EE4E5875E118", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.15.3:*:*:*:*:*:*:*", "matchCriteriaId": "D16DBA5E-582F-4648-932E-8A1EFB7FE3D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.15.4:*:*:*:*:*:*:*", "matchCriteriaId": "A25323F4-7C67-4097-AD53-A6B9E6D96BA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.15.5:*:*:*:*:*:*:*", "matchCriteriaId": "36919682-F59E-4EC0-886C-AE967F636753", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.16.0:*:*:*:*:*:*:*", "matchCriteriaId": "B45AF234-3651-4367-BFEF-8766F66FB138", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.16.1:*:*:*:*:*:*:*", "matchCriteriaId": "E46A9126-A02E-44CD-885D-0956E0C87C2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.16.2:*:*:*:*:*:*:*", "matchCriteriaId": "91E9C756-7FE3-4197-8C18-99CD1F49B0D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.16.3:*:*:*:*:*:*:*", "matchCriteriaId": "88806B7D-5EFE-4F91-B115-732882D2C126", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.16.4:*:*:*:*:*:*:*", "matchCriteriaId": "5BB9E8AB-B3EC-4743-B39B-7325EEB17233", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.17.0:*:*:*:*:*:*:*", "matchCriteriaId": "5030FBB0-C95B-4ADE-BFC2-CCA37AAD019B", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.17.1:*:*:*:*:*:*:*", "matchCriteriaId": "5513618A-6770-4292-95D1-68F55D8343CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.18.0:*:*:*:*:*:*:*", "matchCriteriaId": "7494C01F-E9EC-406E-879A-B2045865E282", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.18.1:*:*:*:*:*:*:*", "matchCriteriaId": "7DD9F894-4576-4ED1-9F55-4C27ECE7E058", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.18.2:*:*:*:*:*:*:*", "matchCriteriaId": "49AFACAC-BBAF-469B-BF05-0478E987120F", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.19.0:*:*:*:*:*:*:*", "matchCriteriaId": "6A136E86-0697-4915-BC49-F570C776EDE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.19.1:*:*:*:*:*:*:*", "matchCriteriaId": "ECB241AF-A01D-4FD6-B98A-F4C20F844C2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.19.2:*:*:*:*:*:*:*", "matchCriteriaId": "C5B61901-F7DF-4805-8EB7-CA1701CA81CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.19.3:*:*:*:*:*:*:*", "matchCriteriaId": "EB0CDEC9-224A-4668-B2E4-2145653E3F2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.19.4:*:*:*:*:*:*:*", "matchCriteriaId": "E92BE9CB-F001-47A0-94E0-48FC01A63FE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.19.5:*:*:*:*:*:*:*", "matchCriteriaId": "324E2A20-2F66-4E03-9A7F-A09E631E9033", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.19.6:*:*:*:*:*:*:*", "matchCriteriaId": "C8987B53-BD80-40B9-8429-21AD97208040", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.19.7:*:*:*:*:*:*:*", "matchCriteriaId": "490D1BDC-33B9-43BA-B6DA-42DEE577082A", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "B465BE7E-0B4D-4BC4-894B-3F51A201CE91", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.20.1:*:*:*:*:*:*:*", "matchCriteriaId": "CAA17087-3021-4961-B53C-CDCC872A31A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.21.0:*:*:*:*:*:*:*", "matchCriteriaId": "E5CA3936-4602-40E6-B75C-58D3F24268E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.21.1:*:*:*:*:*:*:*", "matchCriteriaId": "D87C110C-21DD-438A-90EF-BE516CF59F3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.21.2:*:*:*:*:*:*:*", "matchCriteriaId": "AD2D9E0E-2EED-4FB5-859C-05226FC48D7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.21.3:*:*:*:*:*:*:*", "matchCriteriaId": "7CA01E21-71CE-4B07-B5A6-D0D7AC493A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.21.4:*:*:*:*:*:*:*", "matchCriteriaId": "51239254-31CE-4BF7-8669-1525BA391362", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.21.5:*:*:*:*:*:*:*", "matchCriteriaId": "2E2BE20D-232D-4C86-81B0-C82CCC1CAA62", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.21.6:*:*:*:*:*:*:*", "matchCriteriaId": "D652FD7C-1521-4391-AAE1-0A4D6F4CE8F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.21.7:*:*:*:*:*:*:*", "matchCriteriaId": "DB861143-F809-45CF-95BE-E64F4BA1A0DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.22.0:*:*:*:*:*:*:*", "matchCriteriaId": "E3480F4A-0AE0-4428-9EDA-5A6B994909A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.23.0:*:*:*:*:*:*:*", "matchCriteriaId": "936BF59E-33A8-46BA-9FBD-8763812E2F10", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.23.1:*:*:*:*:*:*:*", "matchCriteriaId": "33168C81-6DAE-40D6-9693-68390CD71DA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.24.0:*:*:*:*:*:*:*", "matchCriteriaId": "424F9604-AA9A-4D45-A521-0BDEDB723659", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.25.0:*:*:*:*:*:*:*", "matchCriteriaId": "DC6EBCEB-E52C-4FF5-B15A-6960F58090EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.26.0:*:*:*:*:*:*:*", "matchCriteriaId": "D204E994-4591-403C-8EF3-D3B7BF4AA1A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.27.0:*:*:*:*:*:*:*", "matchCriteriaId": "EBF5418D-1162-4B1E-BC3D-06A3E084BEFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.28.0:*:*:*:*:*:*:*", "matchCriteriaId": "1CA65F31-3D54-4F66-A0A3-2BD993FF38F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.28.1:*:*:*:*:*:*:*", "matchCriteriaId": "41ACC9FE-62FF-424B-B4B8-B033FEAF7686", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.29.0:*:*:*:*:*:*:*", "matchCriteriaId": "F8BC39E9-5945-4DC8-ACA8-1C9918D9F279", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.30.0:*:*:*:*:*:*:*", "matchCriteriaId": "B9658447-FBB0-4DEA-8FEE-BD4D3D1BF7FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.31.0:*:*:*:*:*:*:*", "matchCriteriaId": "5ECABFCB-0D02-4B5B-BB35-C6B3C0896348", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.32.0:*:*:*:*:*:*:*", "matchCriteriaId": "5A5176F0-E62F-46FF-B536-DC0680696773", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.33.0:*:*:*:*:*:*:*", "matchCriteriaId": "506A3761-3D24-43DB-88D8-4EB5B9E8BA5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.34.0:*:*:*:*:*:*:*", "matchCriteriaId": "0B6EF8B0-0E86-449C-A500-ACD902A78C7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.35.0:*:*:*:*:*:*:*", "matchCriteriaId": "4D558CC2-0146-4887-834E-19FCB1D512A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.10.6:*:*:*:*:*:*:*", "matchCriteriaId": "2E1F9453-1FB6-4CA7-9285-A243E56667B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.10.7:*:*:*:*:*:*:*", "matchCriteriaId": "F79828BB-2412-46AD-BE3C-A51B48E191AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.10.8:*:*:*:*:*:*:*", "matchCriteriaId": "72D0F13F-D56F-4C1C-A3CF-2E4E704817CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "90A4F2E2-1B43-470E-8935-CB32F12A0124", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "797DF5C7-509E-48FD-BD04-C66E01748728", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.11.2:*:*:*:*:*:*:*", "matchCriteriaId": "47BD868A-CE3B-4E39-A588-C4EDA3265A71", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "4A2EE400-1C36-40F4-A9D1-9AB432F168BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "06E3CB14-FB16-4F4E-9AD9-A02DC727FF6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.12.2:*:*:*:*:*:*:*", "matchCriteriaId": "08DCC42C-C881-4AEA-9348-E8317C54D62B", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.12.3:*:*:*:*:*:*:*", "matchCriteriaId": "2BC4EF5A-C8CB-4F33-B4D1-E4192B179D26", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.13.0:*:*:*:*:*:*:*", "matchCriteriaId": "81CEF54A-9668-4031-926F-9B978DD5CDF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.13.1:*:*:*:*:*:*:*", "matchCriteriaId": "45068C90-8915-4D19-B36B-993980E28D08", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.13.2:*:*:*:*:*:*:*", "matchCriteriaId": "24543011-2458-47B5-984A-901E70084902", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.14.0:*:*:*:*:*:*:*", "matchCriteriaId": "FB482A9C-D577-4AEE-A08F-CAFA6586B51E", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.14.1:*:*:*:*:*:*:*", "matchCriteriaId": "65AF9B86-A555-4D5E-B24E-9EBF78BCD8CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.15.0:*:*:*:*:*:*:*", "matchCriteriaId": "60BBDF07-DB97-433E-B542-EFEBE45550DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.15.1:*:*:*:*:*:*:*", "matchCriteriaId": "CA8BE3F8-82ED-4DD7-991E-979E950C98B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.15.2:*:*:*:*:*:*:*", "matchCriteriaId": "738AA231-4694-46E8-B559-1594263A9987", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.15.3:*:*:*:*:*:*:*", "matchCriteriaId": "E9E1F171-B887-499A-BF4F-538EBF347811", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.15.4:*:*:*:*:*:*:*", "matchCriteriaId": "07AA276A-0EBA-4DC9-951C-8F8159FAC7A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.15.5:*:*:*:*:*:*:*", "matchCriteriaId": "8DEEF534-9AD2-4439-9D69-E91D062C4647", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.16.0:*:*:*:*:*:*:*", "matchCriteriaId": "63643BE1-C978-4CD2-8ED1-2B979DB0676E", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.16.1:*:*:*:*:*:*:*", "matchCriteriaId": "F6FA04A0-9258-4654-ABCF-F41340B1FA35", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.16.2:*:*:*:*:*:*:*", "matchCriteriaId": "DE829230-AFDB-4131-9C6A-D9D7A66C5B57", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.16.3:*:*:*:*:*:*:*", "matchCriteriaId": "B7E8BA30-8087-48D4-AE1B-48326FF826B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.16.4:*:*:*:*:*:*:*", "matchCriteriaId": "47970EFF-2F51-4875-A6BD-E30614E13278", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.17.0:*:*:*:*:*:*:*", "matchCriteriaId": "52C9B668-3204-41C5-A82E-262BDFA541DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*", "matchCriteriaId": "08C8EE1E-E186-42D6-8B12-05865C73F261", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*", "matchCriteriaId": "EEA3D88B-41B9-4D79-B47D-B3D6058C0C27", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.18.1:*:*:*:*:*:*:*", "matchCriteriaId": "C2C80901-D48E-4C2A-9BED-A40007A11C97", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*", "matchCriteriaId": "331A51E4-AA73-486F-9618-5A83965F2436", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.0:*:*:*:*:*:*:*", "matchCriteriaId": "EB32DF2C-9208-4853-ADEB-B00D764D7467", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.1:*:*:*:*:*:*:*", "matchCriteriaId": "E05636DC-7E38-4605-AAB8-81C0AE37520A", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.2:*:*:*:*:*:*:*", "matchCriteriaId": "624DF2F1-53FD-48D3-B93D-44E99C9C0C5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*", "matchCriteriaId": "F2171C7C-311A-4405-B95F-3A54966FA844", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.4:*:*:*:*:*:*:*", "matchCriteriaId": "5DE20A41-8B53-46FC-9002-69CC7495171F", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.5:*:*:*:*:*:*:*", "matchCriteriaId": "87ED9DA0-E880-4CBB-B1AC-5AEE8A004718", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.6:*:*:*:*:*:*:*", "matchCriteriaId": "5293C7F0-BF9F-4768-889A-876CE78903CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.7:*:*:*:*:*:*:*", "matchCriteriaId": "F3EB41B3-65F3-4B0E-8CCC-325B14AF605B", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "857B244C-2AFB-40C7-A893-7C6DE9871BCE", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.20.1:*:*:*:*:*:*:*", "matchCriteriaId": "B732CE55-820A-40E0-A885-71BBB6CF8C15", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.0:*:*:*:*:*:*:*", "matchCriteriaId": "0455A5F2-1515-4CD8-BA2F-74D28E91A661", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.1:*:*:*:*:*:*:*", "matchCriteriaId": "29034B3A-BE9D-4D68-8C56-4465C03C3693", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*", "matchCriteriaId": "6249538E-FBCB-4130-91FB-DA78D7BA45DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.3:*:*:*:*:*:*:*", "matchCriteriaId": "5E11B8A5-50A2-468F-BFB3-86DD9D28AC73", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.4:*:*:*:*:*:*:*", "matchCriteriaId": "9EAE25A0-3828-46F1-AB30-88732CBC9F38", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.5:*:*:*:*:*:*:*", "matchCriteriaId": "1533A85C-2160-445D-8787-E624AEDC5A0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.6:*:*:*:*:*:*:*", "matchCriteriaId": "D87B9393-7EA4-43DA-900C-7E840AE2D4C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.7:*:*:*:*:*:*:*", "matchCriteriaId": "7D1249E9-304F-4952-8DAB-8B79CE5E7D54", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*", "matchCriteriaId": "83FAF953-6A65-4FAB-BDB5-03B468CD1C9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*", "matchCriteriaId": "29F8FF1F-A639-4161-9366-62528AAF4C07", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.23.1:*:*:*:*:*:*:*", "matchCriteriaId": "812AB429-379A-4EDE-9664-5BC2989053F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.24.0:*:*:*:*:*:*:*", "matchCriteriaId": "13DD791F-C4BD-4456-955A-92E84082AA09", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.25.0:*:*:*:*:*:*:*", "matchCriteriaId": "4A17E442-45AA-4780-98B4-9BF764DCC1C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*", "matchCriteriaId": "F6AF544C-5F16-4434-B9FB-93B1B7318950", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*", "matchCriteriaId": "CBFD9ED9-2412-44AE-9C55-0ED03A121B23", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*", "matchCriteriaId": "67CCE31B-ABDA-4F32-BAF1-B1AD0664B3E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*", "matchCriteriaId": "9E66A332-ECD1-4452-B444-FB629022FDF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.29.0:*:*:*:*:*:*:*", "matchCriteriaId": "CDD3D599-35E9-4590-B5E0-3AF04D344695", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.30.0:*:*:*:*:*:*:*", "matchCriteriaId": "A3B6BFFB-7967-482C-9B49-4BD25C815299", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*", "matchCriteriaId": "1791BF6D-2C96-4A6E-90D4-2906A73601F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*", "matchCriteriaId": "260DD751-4145-4B75-B892-5FC932C6A305", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*", "matchCriteriaId": "EFF4AD0D-2EC5-4CE8-B6B3-2EC8ED2FF118", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*", "matchCriteriaId": "3EB1CB85-0A9B-4816-B471-278774EE6D4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*", "matchCriteriaId": "3831AB03-4E7E-476D-9623-58AADC188DFE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "cURL and libcurl 7.1 before 7.36.0, when using the OpenSSL, axtls, qsossl or gskit libraries for TLS, recognize a wildcard IP address in the subject\u0027s Common Name (CN) field of an X.509 certificate, which might allow man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority." }, { "lang": "es", "value": "cURL y libcurl 7.1 anterior a 7.36.0, cuando utilizando las librer\u00edas OpenSSL, axtls, gsossl o gskit para TLS, reconoce una direcci\u00f3n IP comod\u00edn (wildcard) en el campo del asunto Common Name (CN) de un certificado X.509, lo cual permitir\u00eda a atacantes man-in-the-middle suplantar servidores SSL arbitrarios a trav\u00e9s de un certificado manipulado emitido por una autoridad de certificaci\u00f3n leg\u00edtima." } ], "id": "CVE-2014-0139", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-04-15T14:55:04.137", "references": [ { "source": "secalert@redhat.com", "url": "http://advisories.mageia.org/MGASA-2015-0165.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://curl.haxx.se/docs/adv_20140326B.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-updates/2014-04/msg00042.html" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/57836" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/57966" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/57968" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/58615" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/59458" }, { "source": "secalert@redhat.com", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21675820" }, { "source": "secalert@redhat.com", "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095862" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2014/dsa-2902" }, { "source": "secalert@redhat.com", "url": "http://www.getchef.com/blog/2014/04/09/chef-server-11-0-12-release/" }, { "source": "secalert@redhat.com", "url": "http://www.getchef.com/blog/2014/04/09/enterprise-chef-1-4-9-release/" }, { "source": "secalert@redhat.com", "url": "http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/" }, { "source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:213" }, { "source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/USN-2167-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://advisories.mageia.org/MGASA-2015-0165.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://curl.haxx.se/docs/adv_20140326B.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2014-04/msg00042.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/57836" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/57966" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/57968" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/58615" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/59458" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21675820" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095862" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2014/dsa-2902" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.getchef.com/blog/2014/04/09/chef-server-11-0-12-release/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.getchef.com/blog/2014/04/09/enterprise-chef-1-4-9-release/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:213" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-2167-1" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-310" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-07-31 08:15
Modified
2024-11-21 09:51
Severity ?
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
6.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
6.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
Summary
libcurl's ASN1 parser code has the `GTime2str()` function, used for parsing an
ASN.1 Generalized Time field. If given an syntactically incorrect field, the
parser might end up using -1 for the length of the *time fraction*, leading to
a `strlen()` getting performed on a pointer to a heap buffer area that is not
(purposely) null terminated.
This flaw most likely leads to a crash, but can also lead to heap contents
getting returned to the application when
[CURLINFO_CERTINFO](https://curl.se/libcurl/c/CURLINFO_CERTINFO.html) is used.
References
▶ | URL | Tags | |
---|---|---|---|
2499f714-1537-4658-8207-48ae4bb9eae9 | http://www.openwall.com/lists/oss-security/2024/07/31/1 | Mailing List | |
2499f714-1537-4658-8207-48ae4bb9eae9 | https://curl.se/docs/CVE-2024-7264.html | Vendor Advisory | |
2499f714-1537-4658-8207-48ae4bb9eae9 | https://curl.se/docs/CVE-2024-7264.json | Vendor Advisory | |
2499f714-1537-4658-8207-48ae4bb9eae9 | https://hackerone.com/reports/2629968 | Exploit, Issue Tracking, Permissions Required, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2024/07/31/1 | Mailing List | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/curl/curl/commit/27959ecce75cdb2809c0bdb3286e60e08fadb519 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20240828-0008/ |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*", "matchCriteriaId": "A578587B-41C6-48AE-B389-54B89C7116A4", "versionEndExcluding": "8.9.1", "versionStartIncluding": "7.32.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "libcurl\u0027s ASN1 parser code has the `GTime2str()` function, used for parsing an\nASN.1 Generalized Time field. If given an syntactically incorrect field, the\nparser might end up using -1 for the length of the *time fraction*, leading to\na `strlen()` getting performed on a pointer to a heap buffer area that is not\n(purposely) null terminated.\n\nThis flaw most likely leads to a crash, but can also lead to heap contents\ngetting returned to the application when\n[CURLINFO_CERTINFO](https://curl.se/libcurl/c/CURLINFO_CERTINFO.html) is used." }, { "lang": "es", "value": "El c\u00f3digo del analizador ASN1 de libcurl tiene la funci\u00f3n `GTime2str()`, que se utiliza para analizar un campo de tiempo generalizado ASN.1. Si se proporciona un campo sint\u00e1cticamente incorrecto, el analizador puede terminar usando -1 para la longitud de la *time fraction*, lo que lleva a que se ejecute una `strlen()` en un puntero a un \u00e1rea de b\u00fafer de almacenamiento din\u00e1mico que no est\u00e1 (intencionadamente) terminada en nulo. Este fallo probablemente lleve a un bloqueo, pero tambi\u00e9n puede llevar a que se devuelvan contenidos del mont\u00f3n a la aplicaci\u00f3n cuando se utiliza [CURLINFO_CERTINFO](https://curl.se/libcurl/c/CURLINFO_CERTINFO.html)." } ], "id": "CVE-2024-7264", "lastModified": "2024-11-21T09:51:10.360", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2024-07-31T08:15:02.657", "references": [ { "source": "2499f714-1537-4658-8207-48ae4bb9eae9", "tags": [ "Mailing List" ], "url": "http://www.openwall.com/lists/oss-security/2024/07/31/1" }, { "source": "2499f714-1537-4658-8207-48ae4bb9eae9", "tags": [ "Vendor Advisory" ], "url": "https://curl.se/docs/CVE-2024-7264.html" }, { "source": "2499f714-1537-4658-8207-48ae4bb9eae9", "tags": [ "Vendor Advisory" ], "url": "https://curl.se/docs/CVE-2024-7264.json" }, { "source": "2499f714-1537-4658-8207-48ae4bb9eae9", "tags": [ "Exploit", "Issue Tracking", "Permissions Required", "Third Party Advisory" ], "url": "https://hackerone.com/reports/2629968" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "http://www.openwall.com/lists/oss-security/2024/07/31/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/curl/curl/commit/27959ecce75cdb2809c0bdb3286e60e08fadb519" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.netapp.com/advisory/ntap-20240828-0008/" } ], "sourceIdentifier": "2499f714-1537-4658-8207-48ae4bb9eae9", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-10-18 04:15
Modified
2025-02-13 17:16
Severity ?
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Summary
This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy
handshake.
When curl is asked to pass along the host name to the SOCKS5 proxy to allow
that to resolve the address instead of it getting done by curl itself, the
maximum length that host name can be is 255 bytes.
If the host name is detected to be longer, curl switches to local name
resolving and instead passes on the resolved address only. Due to this bug,
the local variable that means "let the host resolve the name" could get the
wrong value during a slow SOCKS5 handshake, and contrary to the intention,
copy the too long host name to the target buffer instead of copying just the
resolved address there.
The target buffer being a heap based buffer, and the host name coming from the
URL that curl has been told to operate with.
References
▶ | URL | Tags | |
---|---|---|---|
support@hackerone.com | http://seclists.org/fulldisclosure/2024/Jan/34 | Mailing List, Third Party Advisory | |
support@hackerone.com | http://seclists.org/fulldisclosure/2024/Jan/37 | Mailing List, Third Party Advisory | |
support@hackerone.com | http://seclists.org/fulldisclosure/2024/Jan/38 | Mailing List, Third Party Advisory | |
support@hackerone.com | https://curl.se/docs/CVE-2023-38545.html | Patch, Third Party Advisory | |
support@hackerone.com | https://forum.vmssoftware.com/viewtopic.php?f=8&t=8868 | ||
support@hackerone.com | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OGMXNRNSJ4ETDK6FRNU3J7SABXPWCHSQ/ | Mailing List, Third Party Advisory | |
support@hackerone.com | https://security.netapp.com/advisory/ntap-20231027-0009/ | Third Party Advisory | |
support@hackerone.com | https://security.netapp.com/advisory/ntap-20240201-0005/ | Third Party Advisory | |
support@hackerone.com | https://support.apple.com/kb/HT214036 | Third Party Advisory | |
support@hackerone.com | https://support.apple.com/kb/HT214057 | Third Party Advisory | |
support@hackerone.com | https://support.apple.com/kb/HT214058 | Third Party Advisory | |
support@hackerone.com | https://support.apple.com/kb/HT214063 | Third Party Advisory | |
support@hackerone.com | https://www.secpod.com/blog/high-severity-heap-buffer-overflow-vulnerability/ | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2024/Jan/34 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2024/Jan/37 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2024/Jan/38 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://curl.se/docs/CVE-2023-38545.html | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://forum.vmssoftware.com/viewtopic.php?f=8&t=8868 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OGMXNRNSJ4ETDK6FRNU3J7SABXPWCHSQ/ | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20231027-0009/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20240201-0005/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT214036 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT214057 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT214058 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT214063 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.secpod.com/blog/high-severity-heap-buffer-overflow-vulnerability/ | Patch, Third Party Advisory | |
134c704f-9b21-4f2e-91b3-4a467353bcc0 | https://github.com/UTsweetyfish/CVE-2023-38545 | ||
134c704f-9b21-4f2e-91b3-4a467353bcc0 | https://github.com/bcdannyboy/CVE-2023-38545 | ||
134c704f-9b21-4f2e-91b3-4a467353bcc0 | https://github.com/dbrugman/CVE-2023-38545-POC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
haxx | libcurl | * | |
fedoraproject | fedora | 37 | |
netapp | active_iq_unified_manager | - | |
netapp | active_iq_unified_manager | - | |
netapp | oncommand_insight | - | |
netapp | oncommand_workflow_automation | - | |
microsoft | windows_10_1809 | * | |
microsoft | windows_10_21h2 | * | |
microsoft | windows_10_22h2 | * | |
microsoft | windows_11_21h2 | * | |
microsoft | windows_11_22h2 | * | |
microsoft | windows_11_23h2 | * | |
microsoft | windows_server_2019 | * | |
microsoft | windows_server_2022 | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*", "matchCriteriaId": "CDB9B842-1D18-4026-B62C-EEBF6F97C908", "versionEndExcluding": "8.4.0", "versionStartIncluding": "7.69.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", "matchCriteriaId": "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*", "matchCriteriaId": "B55E8D50-99B4-47EC-86F9-699B67D473CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1BE6C1F-2565-4E97-92AA-16563E5660A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*", "matchCriteriaId": "5735E553-9731-4AAC-BCFF-989377F817B3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", "matchCriteriaId": "F6B89EC5-12A3-457B-A297-B525FA447BA1", "versionEndExcluding": "10.0.17763.5122", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", "matchCriteriaId": "D3286F3A-3F82-4433-AC77-F4907D3B1650", "versionEndExcluding": "10.0.19044.3693", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", "matchCriteriaId": "85ABCA53-40C8-452B-8D2F-7AAF3624DCD4", "versionEndExcluding": "10.0.19045.3693", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", "matchCriteriaId": "7BCCEFB5-50CD-4D8A-B4A8-16B357367487", "versionEndExcluding": "10.0.22000.2600", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", "matchCriteriaId": "656DB244-CD92-4288-A4CD-76ED0492D65C", "versionEndExcluding": "10.0.22621.2715", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", "matchCriteriaId": "EC26CE6D-0DFD-4642-A806-2A312888A451", "versionEndExcluding": "10.0.22631.2715", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", "matchCriteriaId": "940B3D77-2D2E-41F3-8450-27AF8BB17F18", "versionEndExcluding": "10.0.17763.5122", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", "matchCriteriaId": "9BB96325-BCC0-4C49-AF2A-A12C5CE1D818", "versionEndExcluding": "10.0.20348.2113", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \"let the host resolve the name\" could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with." }, { "lang": "es", "value": "Esta falla hace que curl desborde un b\u00fafer basado en el protocolo de enlace del proxy SOCKS5. Cuando se le pide a curl que pase el nombre de host al proxy SOCKS5 para permitir que resuelva la direcci\u00f3n en lugar de que lo haga curl mismo, la longitud m\u00e1xima que puede tener el nombre de host es 255 bytes. Si se detecta que el nombre de host es m\u00e1s largo, curl cambia a la resoluci\u00f3n de nombres local y en su lugar pasa solo la direcci\u00f3n resuelta. Debido a este error, la variable local que significa \"dejar que el host resuelva el nombre\" podr\u00eda obtener el valor incorrecto durante un protocolo de enlace SOCKS5 lento y, contrariamente a la intenci\u00f3n, copiar el nombre del host demasiado largo al b\u00fafer de destino en lugar de copiar solo la direcci\u00f3n resuelta all\u00ed. El b\u00fafer de destino es un b\u00fafer basado en mont\u00f3n y el nombre de host proviene de la URL con la que se le ha dicho a curl que opere." } ], "id": "CVE-2023-38545", "lastModified": "2025-02-13T17:16:47.823", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2023-10-18T04:15:11.077", "references": [ { "source": "support@hackerone.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2024/Jan/34" }, { "source": "support@hackerone.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2024/Jan/37" }, { "source": "support@hackerone.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2024/Jan/38" }, { "source": "support@hackerone.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://curl.se/docs/CVE-2023-38545.html" }, { "source": "support@hackerone.com", "url": "https://forum.vmssoftware.com/viewtopic.php?f=8\u0026t=8868" }, { "source": "support@hackerone.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OGMXNRNSJ4ETDK6FRNU3J7SABXPWCHSQ/" }, { "source": "support@hackerone.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20231027-0009/" }, { "source": "support@hackerone.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20240201-0005/" }, { "source": "support@hackerone.com", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT214036" }, { "source": "support@hackerone.com", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT214057" }, { "source": "support@hackerone.com", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT214058" }, { "source": "support@hackerone.com", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT214063" }, { "source": "support@hackerone.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.secpod.com/blog/high-severity-heap-buffer-overflow-vulnerability/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2024/Jan/34" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2024/Jan/37" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2024/Jan/38" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://curl.se/docs/CVE-2023-38545.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://forum.vmssoftware.com/viewtopic.php?f=8\u0026t=8868" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OGMXNRNSJ4ETDK6FRNU3J7SABXPWCHSQ/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20231027-0009/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20240201-0005/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT214036" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT214057" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT214058" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT214063" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.secpod.com/blog/high-severity-heap-buffer-overflow-vulnerability/" }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "url": "https://github.com/UTsweetyfish/CVE-2023-38545" }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "url": "https://github.com/bcdannyboy/CVE-2023-38545" }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "url": "https://github.com/dbrugman/CVE-2023-38545-POC" } ], "sourceIdentifier": "support@hackerone.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2021-09-23 13:15
Modified
2025-06-09 15:15
Severity ?
9.1 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
9.1 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
9.1 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
Summary
When sending data to an MQTT server, libcurl <= 7.73.0 and 7.78.0 could in some circumstances erroneously keep a pointer to an already freed memory area and both use that again in a subsequent call to send data and also free it *again*.
References
▶ | URL | Tags | |
---|---|---|---|
support@hackerone.com | http://seclists.org/fulldisclosure/2022/Mar/29 | Mailing List, Third Party Advisory | |
support@hackerone.com | https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf | Patch, Third Party Advisory | |
support@hackerone.com | https://hackerone.com/reports/1269242 | Exploit, Patch, Third Party Advisory | |
support@hackerone.com | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/ | Mailing List, Third Party Advisory | |
support@hackerone.com | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/ | Mailing List, Third Party Advisory | |
support@hackerone.com | https://security.gentoo.org/glsa/202212-01 | Third Party Advisory | |
support@hackerone.com | https://security.netapp.com/advisory/ntap-20211029-0003/ | Third Party Advisory | |
support@hackerone.com | https://support.apple.com/kb/HT213183 | Third Party Advisory | |
support@hackerone.com | https://www.debian.org/security/2022/dsa-5197 | Third Party Advisory | |
support@hackerone.com | https://www.oracle.com/security-alerts/cpuoct2021.html | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2022/Mar/29 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://hackerone.com/reports/1269242 | Exploit, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/ | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/ | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/202212-01 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20211029-0003/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT213183 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2022/dsa-5197 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/security-alerts/cpuoct2021.html | Patch, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
haxx | libcurl | * | |
fedoraproject | fedora | 33 | |
fedoraproject | fedora | 35 | |
netapp | cloud_backup | - | |
netapp | clustered_data_ontap | - | |
oracle | mysql_server | * | |
oracle | mysql_server | * | |
netapp | h300s_firmware | - | |
netapp | h300s | - | |
netapp | h500s_firmware | - | |
netapp | h500s | - | |
netapp | h700s_firmware | - | |
netapp | h700s | - | |
netapp | h300e_firmware | - | |
netapp | h300e | - | |
netapp | h500e_firmware | - | |
netapp | h500e | - | |
netapp | h700e_firmware | - | |
netapp | h700e | - | |
netapp | h410s_firmware | - | |
netapp | h410s | - | |
netapp | solidfire_baseboard_management_controller_firmware | - | |
netapp | solidfire_baseboard_management_controller | - | |
apple | macos | * | |
siemens | sinec_ins | * | |
debian | debian_linux | 11.0 | |
splunk | universal_forwarder | * | |
splunk | universal_forwarder | * | |
splunk | universal_forwarder | 9.1.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*", "matchCriteriaId": "9F299899-24BA-432D-818D-32546C576E9B", "versionEndIncluding": "7.78.0", "versionStartIncluding": "7.73.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C2089EE-5D7F-47EC-8EA5-0F69790564C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*", "matchCriteriaId": "1FE996B1-6951-4F85-AA58-B99A379D2163", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "E667933A-37EA-4BC2-9180-C3B4B7038866", "versionEndIncluding": "5.7.35", "versionStartIncluding": "5.7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "709E83B4-8C66-4255-870B-2F72B37BA8C6", "versionEndIncluding": "8.0.26", "versionStartIncluding": "8.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6770B6C3-732E-4E22-BF1C-2D2FD610061C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F9C8C20-42EB-4AB5-BD97-212DEB070C43", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FFF7106-ED78-49BA-9EC5-B889E3685D53", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*", "matchCriteriaId": "E63D8B0F-006E-4801-BF9D-1C001BBFB4F9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "56409CEC-5A1E-4450-AA42-641E459CC2AF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*", "matchCriteriaId": "B06F4839-D16A-4A61-9BB5-55B13F41E47F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h300e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "108A2215-50FB-4074-94CF-C130FA14566D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h300e:-:*:*:*:*:*:*:*", "matchCriteriaId": "7AFC73CE-ABB9-42D3-9A71-3F5BC5381E0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h500e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "32F0B6C0-F930-480D-962B-3F4EFDCC13C7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h500e:-:*:*:*:*:*:*:*", "matchCriteriaId": "803BC414-B250-4E3A-A478-A3881340D6B8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h700e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0FEB3337-BFDE-462A-908B-176F92053CEC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h700e:-:*:*:*:*:*:*:*", "matchCriteriaId": "736AEAE9-782B-4F71-9893-DED53367E102", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0B4AD8A-F172-4558-AEC6-FF424BA2D912", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*", "matchCriteriaId": "8497A4C9-8474-4A62-8331-3FE862ED4098", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:solidfire_baseboard_management_controller_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB9B8171-F6CA-427D-81E0-6536D3BBFA8D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:solidfire_baseboard_management_controller:-:*:*:*:*:*:*:*", "matchCriteriaId": "090AA6F4-4404-4E26-82AB-C3A22636F276", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "matchCriteriaId": "9422A022-F279-4596-BC97-3223611D73DC", "versionEndExcluding": "12.3", "versionStartIncluding": "12.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:sinec_ins:*:*:*:*:*:*:*:*", "matchCriteriaId": "65B7AF44-C3DB-4C29-8690-827CD4518653", "versionEndExcluding": "1.0.1.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:*", "matchCriteriaId": "5722E753-75DE-4944-A11B-556CB299B57D", "versionEndExcluding": "8.2.12", "versionStartIncluding": "8.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:*", "matchCriteriaId": "DC0F9351-81A4-4FEA-B6B5-6E960A933D32", "versionEndExcluding": "9.0.6", "versionStartIncluding": "9.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:splunk:universal_forwarder:9.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "EED24E67-2957-4C1B-8FEA-E2D2FE7B97FC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "When sending data to an MQTT server, libcurl \u003c= 7.73.0 and 7.78.0 could in some circumstances erroneously keep a pointer to an already freed memory area and both use that again in a subsequent call to send data and also free it *again*." }, { "lang": "es", "value": "Cuando se env\u00edan datos a un servidor MQTT, libcurl versiones anteriores a 7.73.0, incluy\u00e9ndola y 7.78.0, podr\u00eda en algunas circunstancias, mantener err\u00f3neamente un puntero a un \u00e1rea de memoria ya liberada y usarlo de nuevo en una llamada posterior para enviar datos y tambi\u00e9n liberarlo *de nuevo*" } ], "id": "CVE-2021-22945", "lastModified": "2025-06-09T15:15:25.540", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2021-09-23T13:15:08.690", "references": [ { "source": "support@hackerone.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2022/Mar/29" }, { "source": "support@hackerone.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "source": "support@hackerone.com", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://hackerone.com/reports/1269242" }, { "source": "support@hackerone.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/" }, { "source": "support@hackerone.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/" }, { "source": "support@hackerone.com", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202212-01" }, { "source": "support@hackerone.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20211029-0003/" }, { "source": "support@hackerone.com", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT213183" }, { "source": "support@hackerone.com", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5197" }, { "source": "support@hackerone.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2022/Mar/29" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://hackerone.com/reports/1269242" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202212-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20211029-0003/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT213183" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5197" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" } ], "sourceIdentifier": "support@hackerone.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-415" } ], "source": "support@hackerone.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-415" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-415" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2020-12-14 20:15
Modified
2024-11-21 05:38
Severity ?
Summary
curl 7.21.0 to and including 7.73.0 is vulnerable to uncontrolled recursion due to a stack overflow issue in FTP wildcard match parsing.
References
▶ | URL | Tags | |
---|---|---|---|
support@hackerone.com | http://seclists.org/fulldisclosure/2021/Apr/51 | Mailing List, Third Party Advisory | |
support@hackerone.com | https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf | Patch, Third Party Advisory | |
support@hackerone.com | https://curl.se/docs/CVE-2020-8285.html | Vendor Advisory | |
support@hackerone.com | https://github.com/curl/curl/issues/6255 | Exploit, Third Party Advisory | |
support@hackerone.com | https://hackerone.com/reports/1045844 | Permissions Required | |
support@hackerone.com | https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E | Mailing List, Third Party Advisory | |
support@hackerone.com | https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E | Mailing List, Third Party Advisory | |
support@hackerone.com | https://lists.debian.org/debian-lts-announce/2020/12/msg00029.html | Mailing List, Third Party Advisory | |
support@hackerone.com | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL/ | Mailing List, Third Party Advisory | |
support@hackerone.com | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG/ | Mailing List, Third Party Advisory | |
support@hackerone.com | https://security.gentoo.org/glsa/202012-14 | Third Party Advisory | |
support@hackerone.com | https://security.netapp.com/advisory/ntap-20210122-0007/ | Third Party Advisory | |
support@hackerone.com | https://support.apple.com/kb/HT212325 | Third Party Advisory | |
support@hackerone.com | https://support.apple.com/kb/HT212326 | Third Party Advisory | |
support@hackerone.com | https://support.apple.com/kb/HT212327 | Third Party Advisory | |
support@hackerone.com | https://www.debian.org/security/2021/dsa-4881 | Third Party Advisory | |
support@hackerone.com | https://www.oracle.com//security-alerts/cpujul2021.html | Patch, Third Party Advisory | |
support@hackerone.com | https://www.oracle.com/security-alerts/cpuApr2021.html | Patch, Third Party Advisory | |
support@hackerone.com | https://www.oracle.com/security-alerts/cpuapr2022.html | Patch, Third Party Advisory | |
support@hackerone.com | https://www.oracle.com/security-alerts/cpujan2022.html | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2021/Apr/51 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://curl.se/docs/CVE-2020-8285.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/curl/curl/issues/6255 | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://hackerone.com/reports/1045844 | Permissions Required | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2020/12/msg00029.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL/ | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG/ | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/202012-14 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20210122-0007/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT212325 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT212326 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT212327 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2021/dsa-4881 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com//security-alerts/cpujul2021.html | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/security-alerts/cpuApr2021.html | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/security-alerts/cpuapr2022.html | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/security-alerts/cpujan2022.html | Patch, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
haxx | libcurl | * | |
debian | debian_linux | 9.0 | |
debian | debian_linux | 10.0 | |
fedoraproject | fedora | 32 | |
fedoraproject | fedora | 33 | |
netapp | clustered_data_ontap | - | |
netapp | hci_management_node | - | |
netapp | solidfire | - | |
netapp | hci_bootstrap_os | - | |
netapp | hci_compute_node | - | |
netapp | hci_storage_node_firmware | - | |
netapp | hci_storage_node | - | |
apple | mac_os_x | * | |
apple | mac_os_x | * | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.14.6 | |
apple | mac_os_x | 10.15.7 | |
apple | mac_os_x | 10.15.7 | |
apple | mac_os_x | 10.15.7 | |
apple | mac_os_x | 10.15.7 | |
apple | macos | * | |
oracle | communications_billing_and_revenue_management | 12.0.0.3.0 | |
oracle | communications_cloud_native_core_policy | 1.14.0 | |
oracle | essbase | 21.2 | |
oracle | peoplesoft_enterprise_peopletools | 8.58 | |
fujitsu | m10-1_firmware | * | |
fujitsu | m10-1 | - | |
fujitsu | m10-4_firmware | * | |
fujitsu | m10-4 | - | |
fujitsu | m10-4s_firmware | * | |
fujitsu | m10-4s | - | |
fujitsu | m12-1_firmware | * | |
fujitsu | m12-1 | - | |
fujitsu | m12-2_firmware | * | |
fujitsu | m12-2 | - | |
fujitsu | m12-2s_firmware | * | |
fujitsu | m12-2s | - | |
fujitsu | m10-1_firmware | * | |
fujitsu | m10-1 | - | |
fujitsu | m10-4_firmware | * | |
fujitsu | m10-4 | - | |
fujitsu | m10-4s_firmware | * | |
fujitsu | m10-4s | - | |
fujitsu | m12-1_firmware | * | |
fujitsu | m12-1 | - | |
fujitsu | m12-2_firmware | * | |
fujitsu | m12-2 | - | |
fujitsu | m12-2s_firmware | * | |
fujitsu | m12-2s | - | |
siemens | sinec_infrastructure_network_services | * | |
splunk | universal_forwarder | * | |
splunk | universal_forwarder | * | |
splunk | universal_forwarder | 9.1.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*", "matchCriteriaId": "61666FBE-C3B7-4449-89C3-07288182D638", "versionEndExcluding": "7.74.0", "versionStartIncluding": "7.21.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*", "matchCriteriaId": "1FE996B1-6951-4F85-AA58-B99A379D2163", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3C19813-E823-456A-B1CE-EC0684CE1953", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6E9EF0C-AFA8-4F7B-9FDC-1E0F7C26E737", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:hci_bootstrap_os:-:*:*:*:*:*:*:*", "matchCriteriaId": "1C767AA1-88B7-48F0-9F31-A89D16DCD52C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD7447BC-F315-4298-A822-549942FC118B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:hci_storage_node_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4BC4299D-05D3-4875-BC79-C3DC02C88ECE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:hci_storage_node:-:*:*:*:*:*:*:*", "matchCriteriaId": "02DEB4FB-A21D-4CB1-B522-EEE5093E8521", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "B0E97851-4DFF-4852-A339-183331F4ACBC", "versionEndExcluding": "10.14.6", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "DB8A73F8-3074-4B32-B9F6-343B6B1988C5", "versionEndExcluding": "10.15.7", "versionStartIncluding": "10.15", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:-:*:*:*:*:*:*", "matchCriteriaId": "693E7DAE-BBF0-4D48-9F8A-20DDBD4AAC0C", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-001:*:*:*:*:*:*", "matchCriteriaId": "CFE26ECC-A2C2-4501-9950-510DE0E1BD86", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-002:*:*:*:*:*:*", "matchCriteriaId": "26108BEF-0847-4AB0-BD98-35344DFA7835", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-001:*:*:*:*:*:*", "matchCriteriaId": "0FD3467D-7679-479F-9C0B-A93F7CD0929D", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-002:*:*:*:*:*:*", "matchCriteriaId": "D4C6098E-EDBD-4A85-8282-B2E9D9333872", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-003:*:*:*:*:*:*", "matchCriteriaId": "518BB47B-DD76-4E8C-9F10-7EBC1E146191", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-004:*:*:*:*:*:*", "matchCriteriaId": "63940A55-D851-46EB-9668-D82BEFC1FE95", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-005:*:*:*:*:*:*", "matchCriteriaId": "68C7A97A-3801-44FA-96CA-10298FA39883", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-006:*:*:*:*:*:*", "matchCriteriaId": "6D69914D-46C7-4A0E-A075-C863C1692D33", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-007:*:*:*:*:*:*", "matchCriteriaId": "9CDB4476-B521-43E4-A129-8718A8E0A8CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-001:*:*:*:*:*:*", "matchCriteriaId": "9D072B77-BE3F-4A2E-B66A-E2C8DC3781E4", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*", "matchCriteriaId": "A654B8A2-FC30-4171-B0BB-366CD7ED4B6A", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*", "matchCriteriaId": "F1F4BF7F-90D4-4668-B4E6-B06F4070F448", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*", "matchCriteriaId": "0F441A43-1669-478D-9EC8-E96882DE4F9F", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*", "matchCriteriaId": "C1C795B9-E58D-467C-83A8-2D45C792292F", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "matchCriteriaId": "4E699CCC-31F5-458E-A59C-79B3AF143747", "versionEndExcluding": "11.3", "versionStartIncluding": "11.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E39D442D-1997-49AF-8B02-5640BE2A26CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.14.0:*:*:*:*:*:*:*", "matchCriteriaId": "4479F76A-4B67-41CC-98C7-C76B81050F8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:essbase:21.2:*:*:*:*:*:*:*", "matchCriteriaId": "394A16F2-CCD4-44E5-BF6B-E0C782A9FA38", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*", "matchCriteriaId": "D9DB4A14-2EF5-4B54-95D2-75E6CF9AA0A9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fujitsu:m10-1_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5E63B7B2-409A-476E-BA12-2A2D2F3B85DE", "versionEndExcluding": "xcp2410", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:fujitsu:m10-1:-:*:*:*:*:*:*:*", "matchCriteriaId": "983D27DE-BC89-454E-AE47-95A26A3651E2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fujitsu:m10-4_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ADB5D4C9-DA14-4188-9181-17336F9445F6", "versionEndExcluding": "xcp2410", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:fujitsu:m10-4:-:*:*:*:*:*:*:*", "matchCriteriaId": "5825AEE1-B668-40BD-86A9-2799430C742C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fujitsu:m10-4s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0B65E2F3-57EC-46C0-BB4A-0A0F3F8D387E", "versionEndExcluding": "xcp2410", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:fujitsu:m10-4s:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DA2D526-BDCF-4A65-914A-B3BA3A0CD613", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fujitsu:m12-1_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "90B7CFBF-761C-4EAA-A322-EF5E294AADED", "versionEndExcluding": "xcp2410", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:fujitsu:m12-1:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE0CF40B-E5BD-4558-9321-184D58EF621D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fujitsu:m12-2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "48B28ABF-7E1A-4A1E-8F78-0D95D7BDF886", "versionEndExcluding": "xcp2410", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:fujitsu:m12-2:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F3C9C09-7B2B-4DB6-8BE0-35302ED35776", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fujitsu:m12-2s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E74AAF52-1388-4BD9-B17B-3A6A32CA3608", "versionEndExcluding": "xcp2410", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:fujitsu:m12-2s:-:*:*:*:*:*:*:*", "matchCriteriaId": "95503CE5-1D06-4092-A60D-D310AADCAFB1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fujitsu:m10-1_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A107698C-9C63-44A9-8A2B-81EDD5702B4C", "versionEndExcluding": "xcp3110", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:fujitsu:m10-1:-:*:*:*:*:*:*:*", "matchCriteriaId": "983D27DE-BC89-454E-AE47-95A26A3651E2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fujitsu:m10-4_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FC0460E-4695-44FB-99EE-28B2C957B760", "versionEndExcluding": "xcp3110", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:fujitsu:m10-4:-:*:*:*:*:*:*:*", "matchCriteriaId": "5825AEE1-B668-40BD-86A9-2799430C742C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fujitsu:m10-4s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BD54A092-85A7-4459-9C69-19E6E24AC24B", "versionEndExcluding": "xcp3110", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:fujitsu:m10-4s:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DA2D526-BDCF-4A65-914A-B3BA3A0CD613", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fujitsu:m12-1_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5F813DBC-BA1E-4C73-AA11-1BD3F9508372", "versionEndExcluding": "xcp3110", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:fujitsu:m12-1:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE0CF40B-E5BD-4558-9321-184D58EF621D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fujitsu:m12-2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EFDF4F39-1C6C-4AD3-99CF-BD5B44B8C71B", "versionEndExcluding": "xcp3110", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:fujitsu:m12-2:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F3C9C09-7B2B-4DB6-8BE0-35302ED35776", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fujitsu:m12-2s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "416B805F-799A-4466-AC5A-93D083A2ABBD", "versionEndExcluding": "xcp3110", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:fujitsu:m12-2s:-:*:*:*:*:*:*:*", "matchCriteriaId": "95503CE5-1D06-4092-A60D-D310AADCAFB1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*", "matchCriteriaId": "B0F46497-4AB0-49A7-9453-CC26837BF253", "versionEndExcluding": "1.0.1.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:*", "matchCriteriaId": "5722E753-75DE-4944-A11B-556CB299B57D", "versionEndExcluding": "8.2.12", "versionStartIncluding": "8.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:*", "matchCriteriaId": "DC0F9351-81A4-4FEA-B6B5-6E960A933D32", "versionEndExcluding": "9.0.6", "versionStartIncluding": "9.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:splunk:universal_forwarder:9.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "EED24E67-2957-4C1B-8FEA-E2D2FE7B97FC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "curl 7.21.0 to and including 7.73.0 is vulnerable to uncontrolled recursion due to a stack overflow issue in FTP wildcard match parsing." }, { "lang": "es", "value": "curl versiones 7.21.0 hasta 7.73.0 e incluy\u00e9ndola, es vulnerable a una recursividad no controlada debido a un problema de desbordamiento de la pila en el an\u00e1lisis de coincidencias del comod\u00edn FTP" } ], "id": "CVE-2020-8285", "lastModified": "2024-11-21T05:38:39.410", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-12-14T20:15:13.983", "references": [ { "source": "support@hackerone.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/Apr/51" }, { "source": "support@hackerone.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "source": "support@hackerone.com", "tags": [ "Vendor Advisory" ], "url": "https://curl.se/docs/CVE-2020-8285.html" }, { "source": "support@hackerone.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/curl/curl/issues/6255" }, { "source": "support@hackerone.com", "tags": [ "Permissions Required" ], "url": "https://hackerone.com/reports/1045844" }, { "source": "support@hackerone.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "support@hackerone.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "support@hackerone.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00029.html" }, { "source": "support@hackerone.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL/" }, { "source": "support@hackerone.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG/" }, { "source": "support@hackerone.com", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202012-14" }, { "source": "support@hackerone.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210122-0007/" }, { "source": "support@hackerone.com", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212325" }, { "source": "support@hackerone.com", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212326" }, { "source": "support@hackerone.com", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212327" }, { "source": "support@hackerone.com", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4881" }, { "source": "support@hackerone.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "source": "support@hackerone.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "source": "support@hackerone.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "source": "support@hackerone.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/Apr/51" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://curl.se/docs/CVE-2020-8285.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/curl/curl/issues/6255" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required" ], "url": "https://hackerone.com/reports/1045844" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00029.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202012-14" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210122-0007/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212325" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212326" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212327" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4881" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2022.html" } ], "sourceIdentifier": "support@hackerone.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-674" } ], "source": "support@hackerone.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-674" }, { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2016-08-10 14:59
Modified
2025-04-12 10:46
Severity ?
Summary
Use-after-free vulnerability in libcurl before 7.50.1 allows attackers to control which connection is used or possibly have unspecified other impact via unknown vectors.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://lists.opensuse.org/opensuse-updates/2016-09/msg00011.html | Third Party Advisory | |
secalert@redhat.com | http://lists.opensuse.org/opensuse-updates/2016-09/msg00094.html | Third Party Advisory | |
secalert@redhat.com | http://www.debian.org/security/2016/dsa-3638 | Third Party Advisory | |
secalert@redhat.com | http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html | Patch, Third Party Advisory | |
secalert@redhat.com | http://www.securityfocus.com/bid/92306 | Third Party Advisory, VDB Entry | |
secalert@redhat.com | http://www.securitytracker.com/id/1036536 | Third Party Advisory, VDB Entry | |
secalert@redhat.com | http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.563059 | Third Party Advisory | |
secalert@redhat.com | http://www.ubuntu.com/usn/USN-3048-1 | Third Party Advisory | |
secalert@redhat.com | https://access.redhat.com/errata/RHSA-2018:3558 | Third Party Advisory | |
secalert@redhat.com | https://curl.haxx.se/docs/adv_20160803C.html | Mitigation, Vendor Advisory | |
secalert@redhat.com | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GLPXQQKURBQFM4XM6645VRPTOE2AWG33/ | ||
secalert@redhat.com | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K3GQH4V3XAQ5Z53AMQRDEC3C3UHTW7QR/ | ||
secalert@redhat.com | https://security.gentoo.org/glsa/201701-47 | Third Party Advisory | |
secalert@redhat.com | https://source.android.com/security/bulletin/2016-12-01.html | Third Party Advisory | |
secalert@redhat.com | https://www.tenable.com/security/tns-2016-18 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-updates/2016-09/msg00011.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-updates/2016-09/msg00094.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2016/dsa-3638 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/92306 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1036536 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.563059 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-3048-1 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:3558 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://curl.haxx.se/docs/adv_20160803C.html | Mitigation, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GLPXQQKURBQFM4XM6645VRPTOE2AWG33/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K3GQH4V3XAQ5Z53AMQRDEC3C3UHTW7QR/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/201701-47 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://source.android.com/security/bulletin/2016-12-01.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.tenable.com/security/tns-2016-18 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
opensuse | leap | 42.1 | |
haxx | libcurl | * | |
canonical | ubuntu_linux | 12.04 | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 16.04 | |
debian | debian_linux | 8.0 | |
fedoraproject | fedora | 23 | |
fedoraproject | fedora | 24 | |
opensuse | opensuse | 13.2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "matchCriteriaId": "4863BE36-D16A-4D75-90D9-FD76DB5B48B7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*", "matchCriteriaId": "D7D7843C-D4F4-4C0A-A919-9000E00637B6", "versionEndIncluding": "7.50.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "matchCriteriaId": "E79AB8DD-C907-4038-A931-1A5A4CFB6A5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*", "matchCriteriaId": "C729D5D1-ED95-443A-9F53-5D7C2FD9B80C", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "matchCriteriaId": "03117DF1-3BEC-4B8D-AD63-DBBDB2126081", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Use-after-free vulnerability in libcurl before 7.50.1 allows attackers to control which connection is used or possibly have unspecified other impact via unknown vectors." }, { "lang": "es", "value": "Vulnerabilidad de uso despu\u00e9s de liberaci\u00f3n de memoria en libcurl en versiones anteriores a 7.50.1 permite a atacantes controlar qu\u00e9 conexi\u00f3n es usada o posiblemente tener otros impactos no especificados a trav\u00e9s de vectores desconocidos." } ], "id": "CVE-2016-5421", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-08-10T14:59:06.330", "references": [ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-09/msg00011.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-09/msg00094.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2016/dsa-3638" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/92306" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1036536" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.563059" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3048-1" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:3558" }, { "source": "secalert@redhat.com", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://curl.haxx.se/docs/adv_20160803C.html" }, { "source": "secalert@redhat.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GLPXQQKURBQFM4XM6645VRPTOE2AWG33/" }, { "source": "secalert@redhat.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K3GQH4V3XAQ5Z53AMQRDEC3C3UHTW7QR/" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201701-47" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://source.android.com/security/bulletin/2016-12-01.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://www.tenable.com/security/tns-2016-18" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-09/msg00011.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-09/msg00094.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2016/dsa-3638" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/92306" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1036536" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.563059" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3048-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:3558" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://curl.haxx.se/docs/adv_20160803C.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GLPXQQKURBQFM4XM6645VRPTOE2AWG33/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K3GQH4V3XAQ5Z53AMQRDEC3C3UHTW7QR/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201701-47" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://source.android.com/security/bulletin/2016-12-01.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.tenable.com/security/tns-2016-18" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-10-05 01:29
Modified
2025-04-20 01:37
Severity ?
Summary
When asking to get a file from a file:// URL, libcurl provides a feature that outputs meta-data about the file using HTTP-like headers. The code doing this would send the wrong buffer to the user (stdout or the application's provide callback), which could lead to other private data from the heap to get inadvertently displayed. The wrong buffer was an uninitialized memory area allocated on the heap and if it turned out to not contain any zero byte, it would continue and display the data following that buffer in memory.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.securityfocus.com/bid/100281 | Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.securitytracker.com/id/1039119 | Third Party Advisory, VDB Entry | |
cve@mitre.org | https://curl.haxx.se/0809C.patch | Patch, Vendor Advisory | |
cve@mitre.org | https://security.gentoo.org/glsa/201709-14 | Patch, Third Party Advisory, VDB Entry | |
nvd@nist.gov | https://curl.haxx.se/docs/adv_20170809C.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/100281 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1039119 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://curl.haxx.se/0809C.patch | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/201709-14 | Patch, Third Party Advisory, VDB Entry |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:haxx:libcurl:7.54.1:*:*:*:*:*:*:*", "matchCriteriaId": "7C1D4922-F424-45B1-AF98-B1DD33981110", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "When asking to get a file from a file:// URL, libcurl provides a feature that outputs meta-data about the file using HTTP-like headers. The code doing this would send the wrong buffer to the user (stdout or the application\u0027s provide callback), which could lead to other private data from the heap to get inadvertently displayed. The wrong buffer was an uninitialized memory area allocated on the heap and if it turned out to not contain any zero byte, it would continue and display the data following that buffer in memory." }, { "lang": "es", "value": "A la hora de pedir un archivo de una URL de tipo \"file://\", libcurl ofrece una caracter\u00edstica que env\u00eda metadatos sobre el archivo mediante cabeceras HTTP. El c\u00f3digo responsable de esto enviar\u00eda el b\u00fafer err\u00f3neo al usuario (stdout o la llamada de vuelta de la aplicaci\u00f3n), lo que podr\u00eda provocar que otros datos privados de la memoria din\u00e1mica (heap) se muestren en consecuencia. El b\u00fafer err\u00f3neo es un \u00e1rea no inicializada de la memoria asignada en la memoria din\u00e1mica y si resulta que no tienen ning\u00fan byte con valor cero, continuar\u00eda y mostrar\u00eda los datos que siguen a ese b\u00fafer en la memoria." } ], "id": "CVE-2017-1000099", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-10-05T01:29:04.023", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/100281" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039119" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://curl.haxx.se/0809C.patch" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory", "VDB Entry" ], "url": "https://security.gentoo.org/glsa/201709-14" }, { "source": "nvd@nist.gov", "tags": [ "Vendor Advisory" ], "url": "https://curl.haxx.se/docs/adv_20170809C.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/100281" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039119" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://curl.haxx.se/0809C.patch" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory", "VDB Entry" ], "url": "https://security.gentoo.org/glsa/201709-14" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-04-29 22:55
Modified
2025-04-11 00:51
Severity ?
Summary
The tailMatch function in cookie.c in cURL and libcurl before 7.30.0 does not properly match the path domain when sending cookies, which allows remote attackers to steal cookies via a matching suffix in the domain of a URL.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://curl.haxx.se/docs/adv_20130412.html | Vendor Advisory | |
secalert@redhat.com | http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html | ||
secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102056.html | ||
secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102711.html | ||
secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104207.html | ||
secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104598.html | ||
secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105539.html | ||
secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106606.html | ||
secalert@redhat.com | http://lists.opensuse.org/opensuse-updates/2013-06/msg00013.html | ||
secalert@redhat.com | http://lists.opensuse.org/opensuse-updates/2013-06/msg00016.html | ||
secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2013-0771.html | ||
secalert@redhat.com | http://secunia.com/advisories/53044 | Vendor Advisory | |
secalert@redhat.com | http://secunia.com/advisories/53051 | Vendor Advisory | |
secalert@redhat.com | http://secunia.com/advisories/53097 | Vendor Advisory | |
secalert@redhat.com | http://www.debian.org/security/2012/dsa-2660 | ||
secalert@redhat.com | http://www.mandriva.com/security/advisories?name=MDVSA-2013:151 | ||
secalert@redhat.com | http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html | ||
secalert@redhat.com | http://www.osvdb.org/92316 | ||
secalert@redhat.com | http://www.securityfocus.com/bid/59058 | ||
secalert@redhat.com | http://www.ubuntu.com/usn/USN-1801-1 | ||
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=950577 | ||
secalert@redhat.com | https://github.com/bagder/curl/commit/2eb8dcf26cb37f09cffe26909a646e702dbcab66 | ||
secalert@redhat.com | https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0121 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://curl.haxx.se/docs/adv_20130412.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102056.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102711.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104207.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104598.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105539.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106606.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-updates/2013-06/msg00013.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-updates/2013-06/msg00016.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2013-0771.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/53044 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/53051 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/53097 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2012/dsa-2660 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2013:151 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.osvdb.org/92316 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/59058 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-1801-1 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=950577 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/bagder/curl/commit/2eb8dcf26cb37f09cffe26909a646e702dbcab66 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0121 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
haxx | curl | * | |
haxx | curl | 6.0 | |
haxx | curl | 6.1 | |
haxx | curl | 6.1 | |
haxx | curl | 6.2 | |
haxx | curl | 6.3 | |
haxx | curl | 6.3.1 | |
haxx | curl | 6.4 | |
haxx | curl | 6.5 | |
haxx | curl | 6.5.1 | |
haxx | curl | 6.5.2 | |
haxx | curl | 7.1 | |
haxx | curl | 7.1.1 | |
haxx | curl | 7.2 | |
haxx | curl | 7.2.1 | |
haxx | curl | 7.3 | |
haxx | curl | 7.4 | |
haxx | curl | 7.4.1 | |
haxx | curl | 7.4.2 | |
haxx | curl | 7.5.1 | |
haxx | curl | 7.5.2 | |
haxx | curl | 7.6 | |
haxx | curl | 7.6.1 | |
haxx | curl | 7.7 | |
haxx | curl | 7.7.1 | |
haxx | curl | 7.7.2 | |
haxx | curl | 7.7.3 | |
haxx | curl | 7.8 | |
haxx | curl | 7.8.1 | |
haxx | curl | 7.9 | |
haxx | curl | 7.9.1 | |
haxx | curl | 7.9.2 | |
haxx | curl | 7.9.3 | |
haxx | curl | 7.9.4 | |
haxx | curl | 7.9.5 | |
haxx | curl | 7.9.6 | |
haxx | curl | 7.9.7 | |
haxx | curl | 7.9.8 | |
haxx | curl | 7.10 | |
haxx | curl | 7.10.1 | |
haxx | curl | 7.10.2 | |
haxx | curl | 7.10.3 | |
haxx | curl | 7.10.4 | |
haxx | curl | 7.10.5 | |
haxx | curl | 7.10.6 | |
haxx | curl | 7.10.7 | |
haxx | curl | 7.10.8 | |
haxx | curl | 7.11.0 | |
haxx | curl | 7.11.1 | |
haxx | curl | 7.11.2 | |
haxx | curl | 7.12.0 | |
haxx | curl | 7.12.1 | |
haxx | curl | 7.12.2 | |
haxx | curl | 7.12.3 | |
haxx | curl | 7.13.0 | |
haxx | curl | 7.13.1 | |
haxx | curl | 7.13.2 | |
haxx | curl | 7.14.0 | |
haxx | curl | 7.14.1 | |
haxx | curl | 7.15.0 | |
haxx | curl | 7.15.1 | |
haxx | curl | 7.15.2 | |
haxx | curl | 7.15.3 | |
haxx | curl | 7.15.4 | |
haxx | curl | 7.15.5 | |
haxx | curl | 7.16.0 | |
haxx | curl | 7.16.1 | |
haxx | curl | 7.16.2 | |
haxx | curl | 7.16.3 | |
haxx | curl | 7.16.4 | |
haxx | curl | 7.17.0 | |
haxx | curl | 7.17.1 | |
haxx | curl | 7.18.0 | |
haxx | curl | 7.18.1 | |
haxx | curl | 7.18.2 | |
haxx | curl | 7.19.0 | |
haxx | curl | 7.19.1 | |
haxx | curl | 7.19.2 | |
haxx | curl | 7.19.3 | |
haxx | curl | 7.19.4 | |
haxx | curl | 7.19.5 | |
haxx | curl | 7.19.6 | |
haxx | curl | 7.19.7 | |
haxx | curl | 7.20.0 | |
haxx | curl | 7.20.1 | |
haxx | curl | 7.21.0 | |
haxx | curl | 7.21.1 | |
haxx | curl | 7.21.2 | |
haxx | curl | 7.21.3 | |
haxx | curl | 7.21.4 | |
haxx | curl | 7.21.5 | |
haxx | curl | 7.21.6 | |
haxx | curl | 7.21.7 | |
haxx | curl | 7.22.0 | |
haxx | curl | 7.23.0 | |
haxx | curl | 7.23.1 | |
haxx | curl | 7.24.0 | |
haxx | curl | 7.25.0 | |
haxx | curl | 7.26.0 | |
haxx | curl | 7.27.0 | |
haxx | curl | 7.28.0 | |
haxx | curl | 7.28.1 | |
haxx | libcurl | * | |
haxx | libcurl | 7.14.0 | |
haxx | libcurl | 7.14.1 | |
haxx | libcurl | 7.15.0 | |
haxx | libcurl | 7.15.1 | |
haxx | libcurl | 7.15.2 | |
haxx | libcurl | 7.15.3 | |
haxx | libcurl | 7.15.4 | |
haxx | libcurl | 7.15.5 | |
haxx | libcurl | 7.16.0 | |
haxx | libcurl | 7.16.2 | |
haxx | libcurl | 7.16.3 | |
haxx | libcurl | 7.16.4 | |
haxx | libcurl | 7.17.0 | |
haxx | libcurl | 7.17.1 | |
haxx | libcurl | 7.18.0 | |
haxx | libcurl | 7.18.2 | |
haxx | libcurl | 7.19.3 | |
haxx | libcurl | 7.20.0 | |
haxx | libcurl | 7.21.2 | |
haxx | libcurl | 7.22.0 | |
haxx | libcurl | 7.23.0 | |
haxx | libcurl | 7.28.0 | |
haxx | libcurl | 7.28.1 | |
canonical | ubuntu_linux | 8.04 | |
canonical | ubuntu_linux | 10.04 | |
canonical | ubuntu_linux | 11.10 | |
canonical | ubuntu_linux | 12.04 | |
canonical | ubuntu_linux | 12.10 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*", "matchCriteriaId": "47BC981B-0088-4697-BC2F-E5DBA2BBA892", "versionEndIncluding": "7.29.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "D85742EE-A981-45EA-9D14-2BA5E4CF81FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:6.1:*:*:*:*:*:*:*", "matchCriteriaId": "3FF7D563-A268-478E-9965-B574768DA3E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:6.1:beta:*:*:*:*:*:*", "matchCriteriaId": "7DE97346-DCBA-4FF3-AD5E-7083066B578A", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:6.2:*:*:*:*:*:*:*", "matchCriteriaId": "9A8C121F-B533-4257-AC37-2253AAD3099E", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:6.3:*:*:*:*:*:*:*", "matchCriteriaId": "3D19ACAA-BCEA-4450-8656-491E5CAE941D", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:6.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "CBC5B73D-4741-4BEE-ACC7-0DEE13E3583C", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:6.4:*:*:*:*:*:*:*", "matchCriteriaId": "17106212-58A2-4479-AEEB-4FEAE2DFFA61", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:6.5:*:*:*:*:*:*:*", "matchCriteriaId": "B41E3C37-5586-430F-BB13-5FF63A512D5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:6.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "177412FA-CAA2-4A04-B9E9-BC3891C4B8E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:6.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "8692193D-6A8D-4F54-ACEF-8B784A06C7B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "27FD145B-DA28-4F2E-90AA-BDB1ECD8A10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "F1DE174C-D09D-4A5F-A774-452385556B22", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.2:*:*:*:*:*:*:*", "matchCriteriaId": "5EF07A93-5733-4875-837B-BF30EA8CC538", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "46983CB7-F22C-4BA9-B7FD-B9A642C39D84", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.3:*:*:*:*:*:*:*", "matchCriteriaId": "A88A5589-2E8F-48F1-912E-3F2994547953", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.4:*:*:*:*:*:*:*", "matchCriteriaId": "333403F5-6E8E-464D-962B-9C9EB4BFBDC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "BC7E5201-24A0-4CEF-84D2-76DB195D3A8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "B256735A-93DF-41EF-A395-4AE96D84B1BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "9E2EA5EB-B2B6-47EE-8E65-18900FF3FACD", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "650D88F7-EFCA-41E3-909B-9982F5F137B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.6:*:*:*:*:*:*:*", "matchCriteriaId": "BAE65C9C-1DE3-42B2-8A33-8A313025A23D", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "E1A4BB56-CD4F-44BD-99D7-A1ADE44359E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.7:*:*:*:*:*:*:*", "matchCriteriaId": "54C84348-C995-497A-970B-A476163CCCD3", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "CE53270B-8725-46C8-BECA-18D22586E6BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "C08511C8-C3A6-46AD-BB51-89D11C1D5EF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "51CCDA6F-57F9-4210-BEBB-6FDAAF8CDFEA", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.8:*:*:*:*:*:*:*", "matchCriteriaId": "EE4D74D0-C499-40DB-B6EB-4F235D8ABEEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "D00036A8-88E0-433A-BC21-E88712B829D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.9:*:*:*:*:*:*:*", "matchCriteriaId": "CAAE7B6C-903A-49B5-8CF2-F487C997F113", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "63B81C3D-2886-4E2B-9F85-DD074B3155B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "E610D9BA-4FDA-4E6D-96DC-168209C053FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "44BF0AF1-DFE0-4E37-B589-CFCE97B55876", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "FE536964-4741-459B-BBC8-61A7BAA8B71C", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "815B9BC6-7DE1-4149-AB7C-362188EE2871", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A7D07368-C6FE-4229-8262-46A974773F13", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "74980771-8060-4F5E-A6BD-D67956D9AB89", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "FE15C002-03E3-4503-A9EB-4C7CF190FFEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.10:*:*:*:*:*:*:*", "matchCriteriaId": "833263C9-E6A1-41F5-9164-7A4F3AACEB8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "1EA91B1A-835E-43AD-B9C2-992691B3A56E", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.10.2:*:*:*:*:*:*:*", "matchCriteriaId": "3F7D61B0-F591-47AE-918B-41BA0A2C21E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.10.3:*:*:*:*:*:*:*", "matchCriteriaId": "8DFF10A5-6779-46B3-B9BE-693654817334", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.10.4:*:*:*:*:*:*:*", "matchCriteriaId": "53638104-536B-482B-8853-1CE3967FB6F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.10.5:*:*:*:*:*:*:*", "matchCriteriaId": "FA92CDC6-7EB4-492A-91EE-B5F70F7D6C7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.10.6:*:*:*:*:*:*:*", "matchCriteriaId": "5D65CDC0-580B-42B3-97E8-69BE44CDB68C", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.10.7:*:*:*:*:*:*:*", "matchCriteriaId": "01001EEA-AB99-4041-8188-38CEBE9C3031", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.10.8:*:*:*:*:*:*:*", "matchCriteriaId": "31DB0DA3-88B7-43ED-8102-CEBC28524CE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "87596B6A-A7B3-4256-9982-45D3B6E3E018", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "0045855F-A707-415A-AC12-6981B68B08E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.11.2:*:*:*:*:*:*:*", "matchCriteriaId": "B49807DC-0BDA-41F6-BB76-7C62328D245F", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "0A78B6B8-9F4B-46AC-BB04-7EBADC690CBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "EFE80B46-33F0-4338-AF37-9E7E31FC5E83", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.12.2:*:*:*:*:*:*:*", "matchCriteriaId": "DD38D8C6-9EEE-4160-9353-773943A560B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.12.3:*:*:*:*:*:*:*", "matchCriteriaId": "FD33549E-EFFB-466F-8B47-BE036D454693", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.13.0:*:*:*:*:*:*:*", "matchCriteriaId": "16BB71C8-3564-4E69-A2C3-E9AB1F9EF20C", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.13.1:*:*:*:*:*:*:*", "matchCriteriaId": "4966AA12-15DB-44E5-84AF-9D7AF4A52F86", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.13.2:*:*:*:*:*:*:*", "matchCriteriaId": "827B6C8A-59C4-4714-9406-5C8EB5073AB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.14.0:*:*:*:*:*:*:*", "matchCriteriaId": "93A11305-E4FF-473B-9415-AF1F0E7A27D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.14.1:*:*:*:*:*:*:*", "matchCriteriaId": "8444095B-AF8F-42B5-BD4D-9CBE9238E42D", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.15.0:*:*:*:*:*:*:*", "matchCriteriaId": "C22F23AE-02AB-42F0-AA16-D2F8C94E5DE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B33DE520-BD2A-4499-B1F8-1439AE16AB57", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.15.2:*:*:*:*:*:*:*", "matchCriteriaId": "041FCB20-E74F-4550-AC48-EE4E5875E118", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.15.3:*:*:*:*:*:*:*", "matchCriteriaId": "D16DBA5E-582F-4648-932E-8A1EFB7FE3D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.15.4:*:*:*:*:*:*:*", "matchCriteriaId": "A25323F4-7C67-4097-AD53-A6B9E6D96BA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.15.5:*:*:*:*:*:*:*", "matchCriteriaId": "36919682-F59E-4EC0-886C-AE967F636753", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.16.0:*:*:*:*:*:*:*", "matchCriteriaId": "B45AF234-3651-4367-BFEF-8766F66FB138", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.16.1:*:*:*:*:*:*:*", "matchCriteriaId": "E46A9126-A02E-44CD-885D-0956E0C87C2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.16.2:*:*:*:*:*:*:*", "matchCriteriaId": "91E9C756-7FE3-4197-8C18-99CD1F49B0D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.16.3:*:*:*:*:*:*:*", "matchCriteriaId": "88806B7D-5EFE-4F91-B115-732882D2C126", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.16.4:*:*:*:*:*:*:*", "matchCriteriaId": "5BB9E8AB-B3EC-4743-B39B-7325EEB17233", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.17.0:*:*:*:*:*:*:*", "matchCriteriaId": "5030FBB0-C95B-4ADE-BFC2-CCA37AAD019B", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.17.1:*:*:*:*:*:*:*", "matchCriteriaId": "5513618A-6770-4292-95D1-68F55D8343CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.18.0:*:*:*:*:*:*:*", "matchCriteriaId": "7494C01F-E9EC-406E-879A-B2045865E282", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.18.1:*:*:*:*:*:*:*", "matchCriteriaId": "7DD9F894-4576-4ED1-9F55-4C27ECE7E058", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.18.2:*:*:*:*:*:*:*", "matchCriteriaId": "49AFACAC-BBAF-469B-BF05-0478E987120F", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.19.0:*:*:*:*:*:*:*", "matchCriteriaId": "6A136E86-0697-4915-BC49-F570C776EDE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.19.1:*:*:*:*:*:*:*", "matchCriteriaId": "ECB241AF-A01D-4FD6-B98A-F4C20F844C2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.19.2:*:*:*:*:*:*:*", "matchCriteriaId": "C5B61901-F7DF-4805-8EB7-CA1701CA81CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.19.3:*:*:*:*:*:*:*", "matchCriteriaId": "EB0CDEC9-224A-4668-B2E4-2145653E3F2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.19.4:*:*:*:*:*:*:*", "matchCriteriaId": "E92BE9CB-F001-47A0-94E0-48FC01A63FE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.19.5:*:*:*:*:*:*:*", "matchCriteriaId": "324E2A20-2F66-4E03-9A7F-A09E631E9033", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.19.6:*:*:*:*:*:*:*", "matchCriteriaId": "C8987B53-BD80-40B9-8429-21AD97208040", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.19.7:*:*:*:*:*:*:*", "matchCriteriaId": "490D1BDC-33B9-43BA-B6DA-42DEE577082A", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "B465BE7E-0B4D-4BC4-894B-3F51A201CE91", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.20.1:*:*:*:*:*:*:*", "matchCriteriaId": "CAA17087-3021-4961-B53C-CDCC872A31A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.21.0:*:*:*:*:*:*:*", "matchCriteriaId": "E5CA3936-4602-40E6-B75C-58D3F24268E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.21.1:*:*:*:*:*:*:*", "matchCriteriaId": "D87C110C-21DD-438A-90EF-BE516CF59F3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.21.2:*:*:*:*:*:*:*", "matchCriteriaId": "AD2D9E0E-2EED-4FB5-859C-05226FC48D7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.21.3:*:*:*:*:*:*:*", "matchCriteriaId": "7CA01E21-71CE-4B07-B5A6-D0D7AC493A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.21.4:*:*:*:*:*:*:*", "matchCriteriaId": "51239254-31CE-4BF7-8669-1525BA391362", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.21.5:*:*:*:*:*:*:*", "matchCriteriaId": "2E2BE20D-232D-4C86-81B0-C82CCC1CAA62", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.21.6:*:*:*:*:*:*:*", "matchCriteriaId": "D652FD7C-1521-4391-AAE1-0A4D6F4CE8F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.21.7:*:*:*:*:*:*:*", "matchCriteriaId": "DB861143-F809-45CF-95BE-E64F4BA1A0DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.22.0:*:*:*:*:*:*:*", "matchCriteriaId": "E3480F4A-0AE0-4428-9EDA-5A6B994909A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.23.0:*:*:*:*:*:*:*", "matchCriteriaId": "936BF59E-33A8-46BA-9FBD-8763812E2F10", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.23.1:*:*:*:*:*:*:*", "matchCriteriaId": "33168C81-6DAE-40D6-9693-68390CD71DA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.24.0:*:*:*:*:*:*:*", "matchCriteriaId": "424F9604-AA9A-4D45-A521-0BDEDB723659", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.25.0:*:*:*:*:*:*:*", "matchCriteriaId": "DC6EBCEB-E52C-4FF5-B15A-6960F58090EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.26.0:*:*:*:*:*:*:*", "matchCriteriaId": "D204E994-4591-403C-8EF3-D3B7BF4AA1A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.27.0:*:*:*:*:*:*:*", "matchCriteriaId": "EBF5418D-1162-4B1E-BC3D-06A3E084BEFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.28.0:*:*:*:*:*:*:*", "matchCriteriaId": "1CA65F31-3D54-4F66-A0A3-2BD993FF38F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:curl:7.28.1:*:*:*:*:*:*:*", "matchCriteriaId": "41ACC9FE-62FF-424B-B4B8-B033FEAF7686", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*", "matchCriteriaId": "6EB37027-B60F-445A-96CC-57F5F6C3A220", "versionEndIncluding": "7.29.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.14.0:*:*:*:*:*:*:*", "matchCriteriaId": "FB482A9C-D577-4AEE-A08F-CAFA6586B51E", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.14.1:*:*:*:*:*:*:*", "matchCriteriaId": "65AF9B86-A555-4D5E-B24E-9EBF78BCD8CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.15.0:*:*:*:*:*:*:*", "matchCriteriaId": "60BBDF07-DB97-433E-B542-EFEBE45550DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.15.1:*:*:*:*:*:*:*", "matchCriteriaId": "CA8BE3F8-82ED-4DD7-991E-979E950C98B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.15.2:*:*:*:*:*:*:*", "matchCriteriaId": "738AA231-4694-46E8-B559-1594263A9987", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.15.3:*:*:*:*:*:*:*", "matchCriteriaId": "E9E1F171-B887-499A-BF4F-538EBF347811", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.15.4:*:*:*:*:*:*:*", "matchCriteriaId": "07AA276A-0EBA-4DC9-951C-8F8159FAC7A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.15.5:*:*:*:*:*:*:*", "matchCriteriaId": "8DEEF534-9AD2-4439-9D69-E91D062C4647", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.16.0:*:*:*:*:*:*:*", "matchCriteriaId": "63643BE1-C978-4CD2-8ED1-2B979DB0676E", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.16.2:*:*:*:*:*:*:*", "matchCriteriaId": "DE829230-AFDB-4131-9C6A-D9D7A66C5B57", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.16.3:*:*:*:*:*:*:*", "matchCriteriaId": "B7E8BA30-8087-48D4-AE1B-48326FF826B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.16.4:*:*:*:*:*:*:*", "matchCriteriaId": "47970EFF-2F51-4875-A6BD-E30614E13278", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.17.0:*:*:*:*:*:*:*", "matchCriteriaId": "52C9B668-3204-41C5-A82E-262BDFA541DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*", "matchCriteriaId": "08C8EE1E-E186-42D6-8B12-05865C73F261", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*", "matchCriteriaId": "EEA3D88B-41B9-4D79-B47D-B3D6058C0C27", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*", "matchCriteriaId": "331A51E4-AA73-486F-9618-5A83965F2436", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*", "matchCriteriaId": "F2171C7C-311A-4405-B95F-3A54966FA844", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "857B244C-2AFB-40C7-A893-7C6DE9871BCE", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*", "matchCriteriaId": "6249538E-FBCB-4130-91FB-DA78D7BA45DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*", "matchCriteriaId": "83FAF953-6A65-4FAB-BDB5-03B468CD1C9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*", "matchCriteriaId": "29F8FF1F-A639-4161-9366-62528AAF4C07", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*", "matchCriteriaId": "67CCE31B-ABDA-4F32-BAF1-B1AD0664B3E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*", "matchCriteriaId": "9E66A332-ECD1-4452-B444-FB629022FDF0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.04:-:lts:*:*:*:*:*", "matchCriteriaId": "D6DFE2D3-46E2-4D0C-8508-30307D654560", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*", "matchCriteriaId": "7118F616-25CA-4E34-AA13-4D14BB62419F", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*", "matchCriteriaId": "E4174F4F-149E-41A6-BBCC-D01114C05F38", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*", "matchCriteriaId": "F5D324C4-97C7-49D3-A809-9EAD4B690C69", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "matchCriteriaId": "E2076871-2E80-4605-A470-A41C1A8EC7EE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The tailMatch function in cookie.c in cURL and libcurl before 7.30.0 does not properly match the path domain when sending cookies, which allows remote attackers to steal cookies via a matching suffix in the domain of a URL." }, { "lang": "es", "value": "La funci\u00f3n tailMatch en cookie.c en cURL y libcurl antes de v7.30.0 no comprueba correctamente la ruta del dominio al enviar las cookies, lo que permite robar las cookies a atacantes remotos a trav\u00e9s de un sufijo coincidente en el dominio de una URL." } ], "evaluatorImpact": "Per http://www.ubuntu.com/usn/USN-1801-1/\r\n\"A security issue affects these releases of Ubuntu and its derivatives:\r\n\r\n Ubuntu 12.10\r\n Ubuntu 12.04 LTS\r\n Ubuntu 11.10\r\n Ubuntu 10.04 LTS\r\n Ubuntu 8.04 LTS\"", "id": "CVE-2013-1944", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-04-29T22:55:08.560", "references": [ { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://curl.haxx.se/docs/adv_20130412.html" }, { "source": "secalert@redhat.com", "url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102056.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102711.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104207.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104598.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105539.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106606.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00013.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00016.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2013-0771.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/53044" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/53051" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/53097" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2012/dsa-2660" }, { "source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:151" }, { "source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" }, { "source": "secalert@redhat.com", "url": "http://www.osvdb.org/92316" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/59058" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/USN-1801-1" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=950577" }, { "source": "secalert@redhat.com", "url": "https://github.com/bagder/curl/commit/2eb8dcf26cb37f09cffe26909a646e702dbcab66" }, { "source": "secalert@redhat.com", "url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0121" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://curl.haxx.se/docs/adv_20130412.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102056.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102711.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104207.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104598.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105539.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106606.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00013.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00016.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2013-0771.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/53044" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/53051" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/53097" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2012/dsa-2660" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:151" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/92316" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/59058" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1801-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=950577" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/bagder/curl/commit/2eb8dcf26cb37f09cffe26909a646e702dbcab66" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0121" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }