Lucene search

K
ubuntucveUbuntu.comUB:CVE-2023-27538
HistoryMar 20, 2023 - 12:00 a.m.

CVE-2023-27538

2023-03-2000:00:00
ubuntu.com
ubuntu.com
16

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

1.7 Low

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:S/C:P/I:N/A:N

0.0004 Low

EPSS

Percentile

13.8%

An authentication bypass vulnerability exists in libcurl prior to v8.0.0
where it reuses a previously established SSH connection despite the fact
that an SSH option was modified, which should have prevented reuse. libcurl
maintains a pool of previously used connections to reuse them for
subsequent transfers if the configurations match. However, two SSH settings
were omitted from the configuration check, allowing them to match easily,
potentially leading to the reuse of an inappropriate connection.

Notes

Author Note
mdeslaur incomplete fix for CVE-2022-27782
OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchcurl<ย 7.58.0-2ubuntu3.24UNKNOWN
ubuntu20.04noarchcurl<ย 7.68.0-1ubuntu2.18UNKNOWN
ubuntu22.04noarchcurl<ย 7.81.0-1ubuntu1.10UNKNOWN
ubuntu22.10noarchcurl<ย 7.85.0-1ubuntu0.5UNKNOWN
ubuntu23.04noarchcurl<ย 7.88.1-6ubuntu2UNKNOWN

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

1.7 Low

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:S/C:P/I:N/A:N

0.0004 Low

EPSS

Percentile

13.8%