Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-8096

Опубликовано: 11 сент. 2024
Источник: redhat
CVSS3: 6.5
EPSS Низкий

Описание

When curl is told to use the Certificate Status Request TLS extension, often referred to as OCSP stapling, to verify that the server certificate is valid, it might fail to detect some OCSP problems and instead wrongly consider the response as fine. If the returned status reports another error than 'revoked' (like for example 'unauthorized') it is not treated as a bad certficate.

A vulnerability was found in Curl. When curl is told to use the Certificate Status Request TLS extension, often referred to as OCSP stapling, to verify that the server certificate is valid, it might fail to detect some OCSP problems and incorrectly consider the response as fine instead. If the returned status reports an error other than "revoked", such as "unauthorized", it is not treated as a bad certificate.

Отчет

The vulnerability in curl related to OCSP stapling is classified as moderate severity rather than important because it only affects the validation of server certificates under specific conditions: when using the GnuTLS library and when the OCSP response indicates an error other than "revoked", such as "unauthorized". This limits the attack surface, as the issue does not result in outright failure to detect revoked certificates, arguably the most critical OCSP check. Additionally, OCSP stapling is not widely implemented across the web, reducing the likelihood of widespread exploitation.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10curlNot affected
Red Hat Enterprise Linux 6curlOut of support scope
Red Hat Enterprise Linux 7curlNot affected
Red Hat Enterprise Linux 8curlNot affected
Red Hat Enterprise Linux 9curlNot affected
Red Hat JBoss Core ServicescurlAffected
Red Hat OpenShift Container Platform 4rhcosWill not fix

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-295
https://bugzilla.redhat.com/show_bug.cgi?id=2310519curl: OCSP stapling bypass with GnuTLS

EPSS

Процентиль: 39%
0.00172
Низкий

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.5
ubuntu
10 месяцев назад

When curl is told to use the Certificate Status Request TLS extension, often referred to as OCSP stapling, to verify that the server certificate is valid, it might fail to detect some OCSP problems and instead wrongly consider the response as fine. If the returned status reports another error than 'revoked' (like for example 'unauthorized') it is not treated as a bad certficate.

CVSS3: 6.5
nvd
10 месяцев назад

When curl is told to use the Certificate Status Request TLS extension, often referred to as OCSP stapling, to verify that the server certificate is valid, it might fail to detect some OCSP problems and instead wrongly consider the response as fine. If the returned status reports another error than 'revoked' (like for example 'unauthorized') it is not treated as a bad certficate.

CVSS3: 6.5
msrc
8 месяцев назад

Описание отсутствует

CVSS3: 6.5
debian
10 месяцев назад

When curl is told to use the Certificate Status Request TLS extension, ...

suse-cvrf
10 месяцев назад

Security update for curl

EPSS

Процентиль: 39%
0.00172
Низкий

6.5 Medium

CVSS3