Lucene search

K
ubuntucveUbuntu.comUB:CVE-2017-2629
HistoryJul 27, 2018 - 12:00 a.m.

CVE-2017-2629

2018-07-2700:00:00
ubuntu.com
ubuntu.com
9

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

4 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:S/C:N/I:P/A:N

0.002 Low

EPSS

Percentile

57.2%

curl before 7.53.0 has an incorrect TLS Certificate Status Request
extension feature that asks for a fresh proof of the server’s certificate’s
validity in the code that checks for a test success or failure. It ends up
always thinking there’s valid proof, even when there is none or if the
server doesn’t support the TLS extension in question. This could lead to
users not detecting when a server’s certificate goes invalid or otherwise
be mislead that the server is in a better shape than it is in reality. This
flaw also exists in the command line tool (–cert-status).

Notes

Author Note
mdeslaur affects 7.52.0 to and including 7.52.1

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

4 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:S/C:N/I:P/A:N

0.002 Low

EPSS

Percentile

57.2%