CVE-2007-3564 Affecting curl package, versions <7.16.4-1
Threat Intelligence
EPSS
21% (97th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN13-CURL-5674129
- published 18 Jul 2007
- disclosed 18 Jul 2007
Introduced: 18 Jul 2007
CVE-2007-3564 Open this link in a new tabHow to fix?
Upgrade Debian:13
curl
to version 7.16.4-1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream curl
package and not the curl
package as distributed by Debian
.
See How to fix?
for Debian:13
relevant fixed versions and status.
libcurl 7.14.0 through 7.16.3, when built with GnuTLS support, does not check SSL/TLS certificate expiration or activation dates, which allows remote attackers to bypass certain access restrictions.
References
- https://security-tracker.debian.org/tracker/CVE-2007-3564
- http://www.debian.org/security/2007/dsa-1333
- http://www.curl.haxx.se/docs/adv_20070710.html
- http://www.trustix.org/errata/2007/0023/
- http://www.vupen.com/english/advisories/2007/2551
- http://secunia.com/advisories/26104
- http://secunia.com/advisories/26108
- http://secunia.com/advisories/26128
- http://secunia.com/advisories/26231
- http://www.securityfocus.com/bid/24938
- http://www.ubuntu.com/usn/usn-484-1
- https://exchange.xforce.ibmcloud.com/vulnerabilities/35479
CVSS Scores
version 3.1