Lucene search

K
kasperskyKaspersky LabKLA10815
HistoryMay 18, 2016 - 12:00 a.m.

KLA10815 Security bypass vulnerability in cURL

2016-05-1800:00:00
Kaspersky Lab
threats.kaspersky.com
21

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N

2.6 Low

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:H/Au:N/C:N/I:P/A:N

0.008 Low

EPSS

Percentile

80.8%

Detect date:

05/18/2016

Severity:

Warning

Description:

An improper TLS connections handling was found in cURL. By exploiting this vulnerability malicious users can bypass sec. This vulnerability can be exploited remotely via TLS certificate manipulations.

Affected products:

cURL and libcurl versions earlier than 7.49.0

Solution:

Update to the latest version
cURL download page

Original advisories:

Vendor advisory

Impacts:

SB

Related products:

cURL

CVE-IDS:

CVE-2016-37392.6Warning

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N

2.6 Low

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:H/Au:N/C:N/I:P/A:N

0.008 Low

EPSS

Percentile

80.8%