libcurl Use-After-Free Connection Flaw May Let Local Users Gain Elevated Privileges
|
SecurityTracker Alert ID: 1036536 |
SecurityTracker URL: http://securitytracker.com/id/1036536
|
CVE Reference:
CVE-2016-5421
(Links to External Site)
|
Date: Aug 4 2016
|
Impact:
Execution of arbitrary code via local system, User access via local system
|
Fix Available: Yes Vendor Confirmed: Yes
|
Version(s): libcurl 7.32.0 - 7.50.0
|
Description:
A vulnerability was reported in libcurl. A local user can obtain elevated privileges on the target system.
A local user can cause an application to trigger a use-after-free connection flaw in the libcurl multi interface to cause the application to perform unintended actions. A local user may be able to exploit this to gain elevated privileges.
The curl command line tool is not affected.
The vendor was notified on July 3, 2016.
Marcelo Echeverria and Fernando Munoz reported this vulnerability.
|
Impact:
A local user may be able to obtain elevated privileges on the target system.
|
Solution:
The vendor has issued a fix (7.50.1).
The vendor's advisory is available at:
https://curl.haxx.se/docs/adv_20160803C.html
|
Vendor URL: curl.haxx.se/docs/adv_20160803C.html (Links to External Site)
|
Cause:
Access control error, State error
|
Underlying OS: Linux (Any), UNIX (Any), Windows (Any)
|
|
Message History:
This archive entry has one or more follow-up message(s) listed below.
|
Source Message Contents
|
|
[Original Message Not Available for Viewing]
|
|