Improper Authentication Affecting curl package, versions <7.36.0-1
Snyk CVSS
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN11-CURL-532197
- published 15 Apr 2014
- disclosed 15 Apr 2014
Introduced: 15 Apr 2014
CVE-2014-0138 Open this link in a new tabHow to fix?
Upgrade Debian:11
curl
to version 7.36.0-1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream curl
package and not the curl
package as distributed by Debian:11
.
See How to fix?
for Debian:11
relevant fixed versions and status.
The default configuration in cURL and libcurl 7.10.6 before 7.36.0 re-uses (1) SCP, (2) SFTP, (3) POP3, (4) POP3S, (5) IMAP, (6) IMAPS, (7) SMTP, (8) SMTPS, (9) LDAP, and (10) LDAPS connections, which might allow context-dependent attackers to connect as other users via a request, a similar issue to CVE-2014-0015.
References
- ADVISORY
- BUGTRAQ
- CONFIRM
- CONFIRM
- CONFIRM
- CONFIRM
- CONFIRM
- CVE Details
- Debian Security Advisory
- IBM Security Bulletin
- OpenSuse Security Update
- Oracle Security Bulletin
- Seclists Full Disclosure
- Secunia Advisory
- Secunia Advisory
- Secunia Advisory
- Secunia Advisory
- Secunia Advisory
- Ubuntu CVE Tracker
- Ubuntu Security Advisory
- VMware Security Advisory