4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:N/A:N
0.003 Low
EPSS
Percentile
69.0%
Package : curl
Version : 7.21.0-2.1+squeeze10
CVE ID : CVE-2014-3707
Symeon Paraschoudis discovered that the curl_easy_duphandle() function
in cURL, an URL transfer library, has a bug that can lead to libcurl
eventually sending off sensitive data that was not intended for sending,
while performing a HTTP POST operation.
This bug requires CURLOPT_COPYPOSTFIELDS and curl_easy_duphandle() to be
used in that order, and then the duplicate handle must be used to
perform the HTTP POST. The curl command line tool is not affected by
this problem as it does not use this sequence.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 7 | s390x | libcurl3-gnutls | < 7.26.0-1+wheezy11 | libcurl3-gnutls_7.26.0-1+wheezy11_s390x.deb |
Debian | 7 | armhf | libcurl3-dbg | < 7.26.0-1+wheezy11 | libcurl3-dbg_7.26.0-1+wheezy11_armhf.deb |
Debian | 7 | sparc | libcurl3-nss | < 7.26.0-1+wheezy11 | libcurl3-nss_7.26.0-1+wheezy11_sparc.deb |
Debian | 7 | sparc | libcurl4-gnutls-dev | < 7.26.0-1+wheezy11 | libcurl4-gnutls-dev_7.26.0-1+wheezy11_sparc.deb |
Debian | 7 | sparc | curl | < 7.26.0-1+wheezy11 | curl_7.26.0-1+wheezy11_sparc.deb |
Debian | 7 | s390 | libcurl3 | < 7.26.0-1+wheezy11 | libcurl3_7.26.0-1+wheezy11_s390.deb |
Debian | 7 | s390x | libcurl3 | < 7.26.0-1+wheezy11 | libcurl3_7.26.0-1+wheezy11_s390x.deb |
Debian | 7 | kfreebsd-amd64 | libcurl4-openssl-dev | < 7.26.0-1+wheezy11 | libcurl4-openssl-dev_7.26.0-1+wheezy11_kfreebsd-amd64.deb |
Debian | 7 | ia64 | libcurl4-openssl-dev | < 7.26.0-1+wheezy11 | libcurl4-openssl-dev_7.26.0-1+wheezy11_ia64.deb |
Debian | 7 | kfreebsd-amd64 | libcurl3-dbg | < 7.26.0-1+wheezy11 | libcurl3-dbg_7.26.0-1+wheezy11_kfreebsd-amd64.deb |