SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   curl Vendors:   curl.haxx.se
(Ubuntu Issues Fix) cURL/libcurl Certificate Reuse Bug Lets Remote Users Bypass Security Restrictions on the Target System
SecurityTracker Alert ID:  1037199
SecurityTracker URL:  http://securitytracker.com/id/1037199
CVE Reference:   CVE-2016-7141   (Links to External Site)
Date:  Nov 4 2016
Impact:   Disclosure of system information, Disclosure of user information, Modification of system information, Modification of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 7.19.6 through 7.50.1
Description:   A vulnerability was reported in cURL. A remote user can bypass security controls on the target system.

The library may reuse a client certificate from file on a subsequent TLS connection is no certificate is set for the subsequent connection.

Systems with libcurl built on top of Network Security Services (NSS) and with the 'libnsspem.so' library available at runtime is affected.

The command line tool is also affected.

Red Hat Security reported this vulnerability.

Impact:   A remote user may be able to bypass security controls on the target system.
Solution:   Ubuntu has issued a fix for CVE-2016-7141.

The Ubuntu advisory is available at:

http://www.ubuntu.com/usn/usn-3123-1

Vendor URL:  www.ubuntu.com/usn/usn-3123-1 (Links to External Site)
Cause:   Access control error
Underlying OS:  Linux (Ubuntu)
Underlying OS Comments:  12.04 LTS, 14.04 LTS, 16.04 LTS, 16.10

Message History:   This archive entry is a follow-up to the message listed below.
Sep 7 2016 cURL/libcurl Certificate Reuse Bug Lets Remote Users Bypass Security Restrictions on the Target System



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC