Improper Input Validation Affecting libcurl package, versions <0:7.29.0-25.el7
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-RHEL7-LIBCURL-4587963
- published 26 Jul 2021
- disclosed 10 Sep 2014
How to fix?
Upgrade RHEL:7 libcurl to version 0:7.29.0-25.el7 or higher.
This issue was patched in RHSA-2015:2159.
NVD Description
Note: Versions mentioned in the description apply only to the upstream libcurl package and not the libcurl package as distributed by RHEL.
See How to fix? for RHEL:7 relevant fixed versions and status.
cURL and libcurl before 7.38.0 does not properly handle IP addresses in cookie domain names, which allows remote attackers to set cookies for or send arbitrary cookies to certain sites, as demonstrated by a site at 192.168.0.1 setting cookies for a site at 127.168.0.1.
References
- http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
- http://www.securityfocus.com/bid/69748
- http://curl.haxx.se/docs/adv_20140910A.html
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743
- https://support.apple.com/kb/HT205031
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- https://access.redhat.com/security/cve/CVE-2014-3613
- http://www.debian.org/security/2014/dsa-3022
- http://rhn.redhat.com/errata/RHSA-2015-1254.html
- https://access.redhat.com/errata/RHSA-2015:2159
- http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00024.html