Improper Input Validation Affecting libcurl package, versions <0:7.19.7-46.el6
Snyk CVSS
Attack Complexity
Low
User Interaction
Required
Threat Intelligence
EPSS
0.56% (78th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-CENTOS6-LIBCURL-2119130
- published 26 Jul 2021
- disclosed 10 Sep 2014
How to fix?
Upgrade Centos:6
libcurl
to version 0:7.19.7-46.el6 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream libcurl
package and not the libcurl
package as distributed by Centos
.
See How to fix?
for Centos:6
relevant fixed versions and status.
cURL and libcurl before 7.38.0 does not properly handle IP addresses in cookie domain names, which allows remote attackers to set cookies for or send arbitrary cookies to certain sites, as demonstrated by a site at 192.168.0.1 setting cookies for a site at 127.168.0.1.
References
- http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
- http://www.securityfocus.com/bid/69748
- http://curl.haxx.se/docs/adv_20140910A.html
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743
- https://support.apple.com/kb/HT205031
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- https://access.redhat.com/security/cve/CVE-2014-3613
- http://www.debian.org/security/2014/dsa-3022
- http://rhn.redhat.com/errata/RHSA-2015-1254.html
- https://access.redhat.com/errata/RHSA-2015:1254
- http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00024.html