Lucene search

K
archlinuxArchLinuxASA-201704-12
HistoryApr 29, 2017 - 12:00 a.m.

[ASA-201704-12] curl: certificate verification bypass

2017-04-2900:00:00
security.archlinux.org
13

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.005 Low

EPSS

Percentile

75.1%

Arch Linux Security Advisory ASA-201704-12

Severity: Medium
Date : 2017-04-29
CVE-ID : CVE-2017-7468
Package : curl
Type : certificate verification bypass
Remote : Yes
Link : https://security.archlinux.org/AVG-241

Summary

The package curl before version 7.54.0-1 is vulnerable to certificate
verification bypass.

Resolution

Upgrade to 7.54.0-1.

pacman -Syu β€œcurl>=7.54.0-1”

The problem has been fixed upstream in version 7.54.0.

Workaround

None.

Description

libcurl from 7.52.0 to and including 7.53.1 would attempt to resume a
TLS session even if the client certificate had changed. That is
unacceptable since a server by specification is allowed to skip the
client certificate check on resume, and may instead use the old
identity which was established by the previous certificate (or no
certificate).
This flaw is a regression and identical to CVE-2016-5419 reported on
August 3rd 2016, but affecting a different version range.

Impact

An attacker can bypass a client certificate check by taking advantage
of TLS session resumption to reuse a previously established session.

References

https://curl.haxx.se/docs/adv_20170419.html
https://security.archlinux.org/CVE-2017-7468

OSVersionArchitecturePackageVersionFilename
ArchLinuxanyanycurl<Β 7.54.0-1UNKNOWN

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.005 Low

EPSS

Percentile

75.1%