Description
A flaw was found in curl before version 7.51.0 When re-using a connection, curl was doing case insensitive comparisons of user name and password with the existing connections. This means that if an unused connection with proper credentials exists for a protocol that has connection-scoped credentials, an attacker can cause that connection to be reused if s/he knows the case-insensitive version of the correct password.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-711-1 | curl security update |
Debian DSA |
DSA-3705-1 | curl security update |
EUVD |
EUVD-2016-9461 | A flaw was found in curl before version 7.51.0 When re-using a connection, curl was doing case insensitive comparisons of user name and password with the existing connections. This means that if an unused connection with proper credentials exists for a protocol that has connection-scoped credentials, an attacker can cause that connection to be reused if s/he knows the case-insensitive version of the correct password. |
Ubuntu USN |
USN-3123-1 | curl vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T02:27:40.954Z
Reserved: 2016-10-12T00:00:00.000Z
Link: CVE-2016-8616
No data.
Status : Modified
Published: 2018-08-01T06:29:00.287
Modified: 2024-11-21T02:59:41.003
Link: CVE-2016-8616
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN