Lucene search

K
amazonAmazonALAS-2016-730
HistoryAug 17, 2016 - 1:30 p.m.

Medium: curl

2016-08-1713:30:00
alas.aws.amazon.com
25

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

0.007 Low

EPSS

Percentile

80.9%

Issue Overview:

curl and libcurl before 7.50.1 do not prevent TLS session resumption when the client certificate has changed, which allows remote attackers to bypass intended restrictions by resuming a session. (CVE-2016-5419)

curl and libcurl before 7.50.1 do not check the client certificate when choosing the TLS connection to reuse, which might allow remote attackers to hijack the authentication of the connection by leveraging a previously created connection with a different client certificate. (CVE-2016-5420)

libcurl before 7.50.1 allows attackers to control which connection is used or possibly have unspecified other impact via unknown vectors. (CVE-2016-5421)

Affected Packages:

curl

Issue Correction:
Run yum update curl to update your system.

New Packages:

i686:  
    libcurl-7.40.0-8.59.amzn1.i686  
    curl-debuginfo-7.40.0-8.59.amzn1.i686  
    libcurl-devel-7.40.0-8.59.amzn1.i686  
    curl-7.40.0-8.59.amzn1.i686  
  
src:  
    curl-7.40.0-8.59.amzn1.src  
  
x86_64:  
    curl-debuginfo-7.40.0-8.59.amzn1.x86_64  
    curl-7.40.0-8.59.amzn1.x86_64  
    libcurl-devel-7.40.0-8.59.amzn1.x86_64  
    libcurl-7.40.0-8.59.amzn1.x86_64  

Additional References

Red Hat: CVE-2016-5419, CVE-2016-5420, CVE-2016-5421

Mitre: CVE-2016-5419, CVE-2016-5420, CVE-2016-5421

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

0.007 Low

EPSS

Percentile

80.9%