Описание
A flaw was found in curl before version 7.51.0 When re-using a connection, curl was doing case insensitive comparisons of user name and password with the existing connections. This means that if an unused connection with proper credentials exists for a protocol that has connection-scoped credentials, an attacker can cause that connection to be reused if s/he knows the case-insensitive version of the correct password.
Релиз | Статус | Примечание |
---|---|---|
devel | released | 7.50.1-1ubuntu2 |
esm-infra-legacy/trusty | not-affected | 7.35.0-1ubuntu2.10 |
esm-infra/xenial | not-affected | 7.47.0-1ubuntu2.2 |
precise | released | 7.22.0-3ubuntu4.17 |
precise/esm | not-affected | 7.22.0-3ubuntu4.17 |
trusty | released | 7.35.0-1ubuntu2.10 |
trusty/esm | not-affected | 7.35.0-1ubuntu2.10 |
upstream | released | 7.51.0 |
vivid/stable-phone-overlay | ignored | end of life |
vivid/ubuntu-core | released | 7.38.0-3ubuntu2.4 |
Показывать по
EPSS
4.3 Medium
CVSS2
3.7 Low
CVSS3
Связанные уязвимости
A flaw was found in curl before version 7.51.0 When re-using a connection, curl was doing case insensitive comparisons of user name and password with the existing connections. This means that if an unused connection with proper credentials exists for a protocol that has connection-scoped credentials, an attacker can cause that connection to be reused if s/he knows the case-insensitive version of the correct password.
A flaw was found in curl before version 7.51.0 When re-using a connection, curl was doing case insensitive comparisons of user name and password with the existing connections. This means that if an unused connection with proper credentials exists for a protocol that has connection-scoped credentials, an attacker can cause that connection to be reused if s/he knows the case-insensitive version of the correct password.
A flaw was found in curl before version 7.51.0 When re-using a connect ...
A flaw was found in curl before version 7.51.0 When re-using a connection, curl was doing case insensitive comparisons of user name and password with the existing connections. This means that if an unused connection with proper credentials exists for a protocol that has connection-scoped credentials, an attacker can cause that connection to be reused if s/he knows the case-insensitive version of the correct password.
EPSS
4.3 Medium
CVSS2
3.7 Low
CVSS3