Executive Summary
Summary | |
---|---|
Title | curl security update |
Informations | |||
---|---|---|---|
Name | DSA-3240 | First vendor Publication | 2015-04-29 |
Vendor | Debian | Last vendor Modification | 2015-04-29 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:N/A:N) | |||
---|---|---|---|
Cvss Base Score | 5 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
It was discovered that cURL, an URL transfer library, if configured to use a proxy server with the HTTPS protocol, by default could send to the proxy the same HTTP headers it sends to the destination server, possibly leaking sensitive information. For the stable distribution (jessie), this problem has been fixed in version 7.38.0-4+deb8u2. For the testing distribution (stretch), this problem will be fixed in version 7.42.1-1. For the unstable distribution (sid), this problem has been fixed in version 7.42.1-1. We recommend that you upgrade your curl packages. |
Original Source
Url : http://www.debian.org/security/2015/dsa-3240 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-200 | Information Exposure |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:29165 | |||
Oval ID: | oval:org.mitre.oval:def:29165 | ||
Title: | SUSE-SU-2015:0990-1 -- Security update for curl (moderate) | ||
Description: | curl was updated to fix five security issues. The following vulnerabilities were fixed: * CVE-2015-3143: curl could re-use NTML authenticateds connections * CVE-2015-3144: curl could access memory out of bounds with zero length host names * CVE-2015-3145: curl cookie parser could access memory out of boundary * CVE-2015-3148: curl could treat Negotiate as not connection-oriented * CVE-2015-3153: curl could have sent sensitive HTTP headers also to proxies | ||
Family: | unix | Class: | patch |
Reference(s): | SUSE-SU-2015:0990-1 CVE-2015-3143 CVE-2015-3144 CVE-2015-3145 CVE-2015-3148 CVE-2015-3153 | Version: | 3 |
Platform(s): | SUSE Linux Enterprise Server 12 SUSE Linux Enterprise Desktop 12 | Product(s): | curl |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2015-08-20 | IAVM : 2015-A-0199 - Multiple Vulnerabilities in Apple Mac OS X Severity : Category I - VMSKEY : V0061337 |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2015-08-17 | Name : The remote host is missing a Mac OS X update that fixes multiple security vul... File : macosx_10_10_5.nasl - Type : ACT_GATHER_INFO |
2015-06-04 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2015-0990-1.nasl - Type : ACT_GATHER_INFO |
2015-05-29 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2015-0962-1.nasl - Type : ACT_GATHER_INFO |
2015-05-27 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_27f742f603f411e5aab1d050996490d0.nasl - Type : ACT_GATHER_INFO |
2015-05-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2015-356.nasl - Type : ACT_GATHER_INFO |
2015-05-01 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2591-1.nasl - Type : ACT_GATHER_INFO |
2015-04-30 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-3240.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2016-01-22 09:26:11 |
|
2015-05-04 21:30:34 |
|
2015-05-01 21:40:18 |
|
2015-05-01 13:28:28 |
|
2015-04-29 21:25:22 |
|