cURL/libcurl TLS Session Resumption Client Certificate Bug Lets Remote Users Bypass Security Restrictions on the Target System
|
SecurityTracker Alert ID: 1038341 |
SecurityTracker URL: http://securitytracker.com/id/1038341
|
CVE Reference:
CVE-2016-5419, CVE-2017-7468
(Links to External Site)
|
Date: Apr 21 2017
|
Impact:
Disclosure of system information, Disclosure of user information
|
Fix Available: Yes Vendor Confirmed: Yes
|
Version(s): 7.52.0 - 7.53.1
|
Description:
A vulnerability was reported in cURL. A remote user can bypass security controls on the target system.
The library may resume using a TLS session when the client certificate has changed. As a result, an application may be able to send data using incorrect authentication data.
The command line tool is also affected.
The vendor was notified on March 21, 2017.
lijian996 at users.noreply.github.com reported this vulnerability.
|
Impact:
An application may be able to send data using incorrect authentication data.
|
Solution:
The vendor has issued a fix (7.54.0).
The vendor advisory is available at:
https://curl.haxx.se/docs/adv_20170419.html
|
Vendor URL: curl.haxx.se/docs/adv_20170419.html (Links to External Site)
|
Cause:
Authentication error, State error
|
Underlying OS: Linux (Any), UNIX (Any), Windows (Any)
|
|
Message History:
This archive entry has one or more follow-up message(s) listed below.
|
Source Message Contents
|
|
[Original Message Not Available for Viewing]
|
|