Lucene search

K
ubuntucveUbuntu.comUB:CVE-2023-27536
HistoryMar 20, 2023 - 12:00 a.m.

CVE-2023-27536

2023-03-2000:00:00
ubuntu.com
ubuntu.com
32
libcurl
authentication bypass
vulnerability
unauthorized access
sensitive information

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

0.002 Low

EPSS

Percentile

60.2%

An authentication bypass vulnerability exists libcurl <8.0.0 in the
connection reuse feature which can reuse previously established connections
with incorrect user permissions due to a failure to check for changes in
the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects
krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in
unauthorized access to sensitive information. The safest option is to not
reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.

OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchcurl< 7.58.0-2ubuntu3.24UNKNOWN
ubuntu20.04noarchcurl< 7.68.0-1ubuntu2.18UNKNOWN
ubuntu22.04noarchcurl< 7.81.0-1ubuntu1.10UNKNOWN
ubuntu22.10noarchcurl< 7.85.0-1ubuntu0.5UNKNOWN
ubuntu23.04noarchcurl< 7.88.1-6ubuntu2UNKNOWN
ubuntu14.04noarchcurl< 7.35.0-1ubuntu2.20+esm15UNKNOWN
ubuntu16.04noarchcurl< 7.47.0-1ubuntu2.19+esm8UNKNOWN

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

0.002 Low

EPSS

Percentile

60.2%