Lucene search

K
ubuntucveUbuntu.comUB:CVE-2021-22947
HistorySep 15, 2021 - 12:00 a.m.

CVE-2021-22947

2021-09-1500:00:00
ubuntu.com
ubuntu.com
14

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.001 Low

EPSS

Percentile

40.2%

When curl >= 7.20.0 and <= 7.78.0 connects to an IMAP or POP3 server to
retrieve data using STARTTLS to upgrade to TLS security, the server can
respond and send back multiple responses at once that curl caches. curl
would then upgrade to TLS but not flush the in-queue of cached responses
but instead continue using and trustingthe responses it got before the
TLS handshake as if they were authenticated.Using this flaw, it allows a
Man-In-The-Middle attacker to first inject the fake responses, then
pass-through the TLS traffic from the legitimate server and trick curl into
sending data back to the user thinking the attacker’s injected data comes
from the TLS-protected server.

Notes

Author Note
alexmurray Originally introduced via https://github.com/curl/curl/commit/ec3bb8f727405 - affects versions between and including 7.20.0 and 7.78.0 - patch in Message-ID: <nycvar.QRO.7.76.2109100828320.2614@fvyyl>
OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchcurl< 7.58.0-2ubuntu3.15UNKNOWN
ubuntu20.04noarchcurl< 7.68.0-1ubuntu2.7UNKNOWN
ubuntu21.04noarchcurl< 7.74.0-1ubuntu2.3UNKNOWN
ubuntu21.10noarchcurl< 7.74.0-1.3ubuntu2UNKNOWN
ubuntu22.04noarchcurl< 7.74.0-1.3ubuntu2UNKNOWN
ubuntu14.04noarchcurl< 7.35.0-1ubuntu2.20+esm8) Available with Ubuntu Pro or Ubuntu Pro (Infra-onlyUNKNOWN
ubuntu16.04noarchcurl< 7.47.0-1ubuntu2.19+esm1) Available with Ubuntu Pro or Ubuntu Pro (Infra-onlyUNKNOWN

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.001 Low

EPSS

Percentile

40.2%