[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249461

 
 

909

 
 

195508

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2015-514 --- curl, libcurl

ID: oval:org.secpod.oval:def:1200093Date: (C)2015-12-29   (M)2023-12-18
Class: PATCHFamily: unix




It was discovered that libcurl could incorrectly reuse NTLM-authenticated connections for subsequent unauthenticated requests to the same host. If an application using libcurl established an NTLM-authenticated connection to a server, and sent subsequent unauthenticed requests to the same server, the unauthenticated requests could be sent over the NTLM-authenticated connection, appearing as if they were sent by the NTLM authenticated user. It was discovered that libcurl could incorrectly reuse Negotiate authenticated HTTP connections for subsequent requests. If an application using libcurl established a Negotiate authenticated HTTP connection to a server and sent subsequent requests with different credentials, the connection could be re-used with the initial set of credentials instead of using the new ones. It was discovered that libcurl did not properly process cookies with a specially crafted "path" element. If an application using libcurl connected to a malicious HTTP server sending specially crafted "Set-Cookies" headers, this could lead to an out-of-bounds read, and possibly cause that application to crash. It was discovered that libcurl did not properly process zero-length host names. If an attacker could trick an application using libcurl into processing zero-length host names, this could lead to an out-of-bounds read, and possibly cause that application to crash

Platform:
Amazon Linux AMI
Product:
curl
libcurl
Reference:
ALAS-2015-514
CVE-2015-3143
CVE-2015-3148
CVE-2015-3145
CVE-2015-3144
CVE    4
CVE-2015-3145
CVE-2015-3144
CVE-2015-3143
CVE-2015-3148
...
CPE    74
cpe:/o:amazon:linux
cpe:/a:haxx:curl:7.21.0
cpe:/a:haxx:curl:7.40.0
cpe:/a:haxx:curl:7.21.3
...

© SecPod Technologies