Lucene search

K
f5F5F5:K85307687
HistoryNov 16, 2016 - 12:00 a.m.

K85307687 : cURL and libcurl vulnerabilities CVE-2014-3613, CVE-2014-3707, and CVE-2014-8150

2016-11-1600:00:00
my.f5.com
20

9.7 High

AI Score

Confidence

High

0.006 Low

EPSS

Percentile

78.0%

Security Advisory Description

cURL and libcurl before 7.38.0 does not properly handle IP addresses in cookie domain names, which allows remote attackers to set cookies for or send arbitrary cookies to certain sites, as demonstrated by a site at 192.168.0.1 setting cookies for a site at 127.168.0.1.

The curl_easy_duphandle function in libcurl 7.17.1 through 7.38.0, when running with the CURLOPT_COPYPOSTFIELDS option, does not properly copy HTTP POST data for an easy handle, which triggers an out-of-bounds read that allows remote web servers to read sensitive memory information.

CRLF injection vulnerability in libcurl 6.0 through 7.x before 7.40.0, when using an HTTP proxy, allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via CRLF sequences in a URL.
Impact
When using the ARX management API, these vulnerabilities may allow unauthorized disclosure of information and unauthorized modification.
Note: The ARX management API is disabled by default.