Lucene search

K
vulnrichmentCurlVULNRICHMENT:CVE-2024-8096
HistorySep 11, 2024 - 10:03 a.m.

CVE-2024-8096 OCSP stapling bypass with GnuTLS

2024-09-1110:03:59
curl
github.com
1
cve-2024-8096
ocsp stapling
gnutls
certificate status request
tls extension
curl
server certificate
ocsp problems
revoked
unauthorized

EPSS

0

Percentile

16.4%

SSVC

Exploitation

none

Automatable

yes

Technical Impact

partial

When curl is told to use the Certificate Status Request TLS extension, often referred to as OCSP stapling, to verify that the server certificate is valid, it might fail to detect some OCSP problems and instead wrongly consider the response as fine. If the returned status reports another error than ‘revoked’ (like for example ‘unauthorized’) it is not treated as a bad certficate.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:curl:curl:*:*:*:*:*:*:*:*"
    ],
    "vendor": "curl",
    "product": "curl",
    "versions": [
      {
        "status": "affected",
        "version": "7.41.0",
        "versionType": "semver",
        "lessThanOrEqual": "8.9.1"
      }
    ],
    "defaultStatus": "unknown"
  }
]

EPSS

0

Percentile

16.4%

SSVC

Exploitation

none

Automatable

yes

Technical Impact

partial