Lucene search

K
kasperskyKaspersky LabKLA10859
HistoryAug 03, 2016 - 12:00 a.m.

KLA10859 Security bypass vulnerabilities in cURL

2016-08-0300:00:00
Kaspersky Lab
threats.kaspersky.com
30

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

8 High

AI Score

Confidence

High

0.007 Low

EPSS

Percentile

80.9%

Multiple serious vulnerabilities have been found in cURL. Malicious users can exploit these vulnerabilities to bypass security restrictions.

Below is a complete list of vulnerabilities

  1. Use-after-free vulnerability can be exploited to control which connection is used;
  2. An improper TLS connection reuse handling can be exploited remotely via connection manipulations to hijack authentication;
  3. An improper TLS certificate change handling can be exploited remotely via connection manipulations to bypass security restrictions.

Technical details

The curl command line tool is also affected because of these flaws.

All vulnerabilities were found in libcurl library.

Original advisories

cURL vulnerabilities table and advisories

Related products

cURL

CVE list

CVE-2016-5421 high

CVE-2016-5420 warning

CVE-2016-5419 warning

Solution

Update to the latest version or apply patchespatch for CVE-2016-5420cURL download pagepatch for CVE-2016-5419

patch for CVE-2016-5421

Impacts

  • SB

Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.

Affected Products

  • cURL and libcurl versions earlier than 7.50.1

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

8 High

AI Score

Confidence

High

0.007 Low

EPSS

Percentile

80.9%