Lucene search

K
osvGoogleOSV:DSA-3232-1
HistoryApr 22, 2015 - 12:00 a.m.

curl - security update

2015-04-2200:00:00
Google
osv.dev
7

9 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

Several vulnerabilities were discovered in cURL, an URL transfer library:

  • CVE-2015-3143
    NTLM-authenticated connections could be wrongly reused for requests
    without any credentials set, leading to HTTP requests being sent
    over the connection authenticated as a different user. This is
    similar to the issue fixed in DSA-2849-1.
  • CVE-2015-3144
    When parsing URLs with a zero-length hostname (such as “http://:80”),
    libcurl would try to read from an invalid memory address. This could
    allow remote attackers to cause a denial of service (crash). This
    issue only affects the upcoming stable (jessie) and unstable (sid)
    distributions.
  • CVE-2015-3145
    When parsing HTTP cookies, if the parsed cookie’s path element
    consists of a single double-quote, libcurl would try to write to an
    invalid heap memory address. This could allow remote attackers to
    cause a denial of service (crash). This issue only affects the
    upcoming stable (jessie) and unstable (sid) distributions.
  • CVE-2015-3148
    When doing HTTP requests using the Negotiate authentication method
    along with NTLM, the connection used would not be marked as
    authenticated, making it possible to reuse it and send requests for
    one user over the connection authenticated as a different user.

For the stable distribution (wheezy), these problems have been fixed in
version 7.26.0-1+wheezy13.

For the upcoming stable distribution (jessie), these problems have been
fixed in version 7.38.0-4+deb8u1.

For the unstable distribution (sid), these problems have been fixed in
version 7.42.0-1.

We recommend that you upgrade your curl packages.

CPENameOperatorVersion
curleq7.38.0-4

9 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C