Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-5419

Опубликовано: 10 авг. 2016
Источник: debian

Описание

curl and libcurl before 7.50.1 do not prevent TLS session resumption when the client certificate has changed, which allows remote attackers to bypass intended restrictions by resuming a session.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
curlfixed7.50.1-1package

Примечания

  • https://curl.haxx.se/docs/adv_20160803A.html

  • Fixed by https://curl.haxx.se/CVE-2016-5419.patch

  • Wheezy: vulnerable code is in lib/sslgen.c

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 9 лет назад

curl and libcurl before 7.50.1 do not prevent TLS session resumption when the client certificate has changed, which allows remote attackers to bypass intended restrictions by resuming a session.

CVSS3: 4.8
redhat
около 9 лет назад

curl and libcurl before 7.50.1 do not prevent TLS session resumption when the client certificate has changed, which allows remote attackers to bypass intended restrictions by resuming a session.

CVSS3: 7.5
nvd
около 9 лет назад

curl and libcurl before 7.50.1 do not prevent TLS session resumption when the client certificate has changed, which allows remote attackers to bypass intended restrictions by resuming a session.

CVSS3: 7.5
github
больше 3 лет назад

curl and libcurl before 7.50.1 do not prevent TLS session resumption when the client certificate has changed, which allows remote attackers to bypass intended restrictions by resuming a session.

suse-cvrf
почти 9 лет назад

Security update for curl