Lucene search

K
ubuntucveUbuntu.comUB:CVE-2021-22947
HistorySep 15, 2021 - 12:00 a.m.

CVE-2021-22947

2021-09-1500:00:00
ubuntu.com
ubuntu.com
16

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N

0.001 Low

EPSS

Percentile

41.8%

When curl >= 7.20.0 and <= 7.78.0 connects to an IMAP or POP3 server to
retrieve data using STARTTLS to upgrade to TLS security, the server can
respond and send back multiple responses at once that curl caches. curl
would then upgrade to TLS but not flush the in-queue of cached responses
but instead continue using and trustingthe responses it got before the
TLS handshake as if they were authenticated.Using this flaw, it allows a
Man-In-The-Middle attacker to first inject the fake responses, then
pass-through the TLS traffic from the legitimate server and trick curl into
sending data back to the user thinking the attacker’s injected data comes
from the TLS-protected server.

Notes

Author Note
alexmurray Originally introduced via https://github.com/curl/curl/commit/ec3bb8f727405 - affects versions between and including 7.20.0 and 7.78.0 - patch in Message-ID: <nycvar.QRO.7.76.2109100828320.2614@fvyyl>
OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchcurl< 7.58.0-2ubuntu3.15UNKNOWN
ubuntu20.04noarchcurl< 7.68.0-1ubuntu2.7UNKNOWN
ubuntu21.04noarchcurl< 7.74.0-1ubuntu2.3UNKNOWN
ubuntu21.10noarchcurl< 7.74.0-1.3ubuntu2UNKNOWN
ubuntu22.04noarchcurl< 7.74.0-1.3ubuntu2UNKNOWN
ubuntu14.04noarchcurl< 7.35.0-1ubuntu2.20+esm8UNKNOWN
ubuntu16.04noarchcurl< 7.47.0-1ubuntu2.19+esm1UNKNOWN

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N

0.001 Low

EPSS

Percentile

41.8%