7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.013 Low
EPSS
Percentile
86.0%
Issue Overview:
This build resolves the following issues:
CVE-2016-8615: Cookie injection for other servers
CVE-2016-8616: Case insensitive password comparison
CVE-2016-8617: Out-of-bounds write via unchecked multiplication
CVE-2016-8618: Double-free in curl_maprintf
CVE-2016-8619: Double-free in krb5 code
CVE-2016-8620: Glob parser write/read out of bounds
CVE-2016-8621: curl_getdate out-of-bounds read
CVE-2016-8622: URL unescape heap overflow via integer truncation
CVE-2016-8623: Use-after-free via shared cookies
CVE-2016-8624: Invalid URL parsing with ‘#’
Affected Packages:
curl
Issue Correction:
Run yum update curl to update your system.
New Packages:
i686:
libcurl-7.47.1-9.66.amzn1.i686
libcurl-devel-7.47.1-9.66.amzn1.i686
curl-7.47.1-9.66.amzn1.i686
curl-debuginfo-7.47.1-9.66.amzn1.i686
src:
curl-7.47.1-9.66.amzn1.src
x86_64:
curl-7.47.1-9.66.amzn1.x86_64
libcurl-devel-7.47.1-9.66.amzn1.x86_64
libcurl-7.47.1-9.66.amzn1.x86_64
curl-debuginfo-7.47.1-9.66.amzn1.x86_64
Red Hat: CVE-2016-8615, CVE-2016-8616, CVE-2016-8617, CVE-2016-8618, CVE-2016-8619, CVE-2016-8620, CVE-2016-8621, CVE-2016-8622, CVE-2016-8623, CVE-2016-8624
Mitre: CVE-2016-8615, CVE-2016-8616, CVE-2016-8617, CVE-2016-8618, CVE-2016-8619, CVE-2016-8620, CVE-2016-8621, CVE-2016-8622, CVE-2016-8623, CVE-2016-8624
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Amazon Linux | 1 | i686 | libcurl | < 7.47.1-9.66.amzn1 | libcurl-7.47.1-9.66.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | libcurl-devel | < 7.47.1-9.66.amzn1 | libcurl-devel-7.47.1-9.66.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | curl | < 7.47.1-9.66.amzn1 | curl-7.47.1-9.66.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | curl-debuginfo | < 7.47.1-9.66.amzn1 | curl-debuginfo-7.47.1-9.66.amzn1.i686.rpm |
Amazon Linux | 1 | x86_64 | curl | < 7.47.1-9.66.amzn1 | curl-7.47.1-9.66.amzn1.x86_64.rpm |
Amazon Linux | 1 | x86_64 | libcurl-devel | < 7.47.1-9.66.amzn1 | libcurl-devel-7.47.1-9.66.amzn1.x86_64.rpm |
Amazon Linux | 1 | x86_64 | libcurl | < 7.47.1-9.66.amzn1 | libcurl-7.47.1-9.66.amzn1.x86_64.rpm |
Amazon Linux | 1 | x86_64 | curl-debuginfo | < 7.47.1-9.66.amzn1 | curl-debuginfo-7.47.1-9.66.amzn1.x86_64.rpm |
7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.013 Low
EPSS
Percentile
86.0%