CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AI Score
Confidence
Low
EPSS
Percentile
71.9%
USN-5964-1 fixed several vulnerabilities in curl. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.
Original advisory details:
Harry Sintonen discovered that curl incorrectly handled certain TELNET
connection options. Due to lack of proper input scrubbing, curl could pass
on user name and telnet options to the server as provided, contrary to
expectations. (CVE-2023-27533)
Harry Sintonen discovered that curl incorrectly reused certain FTP
connections. This could lead to the wrong credentials being reused,
contrary to expectations. (CVE-2023-27535)
Harry Sintonen discovered that curl incorrectly reused connections when the
GSS delegation option had been changed. This could lead to the option being
reused, contrary to expectations. (CVE-2023-27536)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 16.04 | noarch | libcurl3-gnutls | < 7.47.0-1ubuntu2.19+esm8 | UNKNOWN |
Ubuntu | 16.04 | noarch | curl | < 7.47.0-1ubuntu2.19 | UNKNOWN |
Ubuntu | 16.04 | noarch | curl-dbgsym | < 7.47.0-1ubuntu2.19 | UNKNOWN |
Ubuntu | 16.04 | noarch | libcurl3 | < 7.47.0-1ubuntu2.19 | UNKNOWN |
Ubuntu | 16.04 | noarch | libcurl3-dbg | < 7.47.0-1ubuntu2.19 | UNKNOWN |
Ubuntu | 16.04 | noarch | libcurl3-dbgsym | < 7.47.0-1ubuntu2.19 | UNKNOWN |
Ubuntu | 16.04 | noarch | libcurl3-gnutls | < 7.47.0-1ubuntu2.19 | UNKNOWN |
Ubuntu | 16.04 | noarch | libcurl3-gnutls-dbgsym | < 7.47.0-1ubuntu2.19 | UNKNOWN |
Ubuntu | 16.04 | noarch | libcurl3-nss | < 7.47.0-1ubuntu2.19 | UNKNOWN |
Ubuntu | 16.04 | noarch | libcurl3-nss-dbgsym | < 7.47.0-1ubuntu2.19 | UNKNOWN |