curl and libcurl before 7.50.1 do not check the client certificate when choosing the TLS connection to reuse, which might allow remote attackers to hijack the authentication of the connection by leveraging a previously created connection with a different client certificate.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-586-1 | curl security update |
Debian DLA |
DLA-1568-1 | curl security update |
Debian DSA |
DSA-3638-1 | curl security update |
EUVD |
EUVD-2016-6365 | curl and libcurl before 7.50.1 do not check the client certificate when choosing the TLS connection to reuse, which might allow remote attackers to hijack the authentication of the connection by leveraging a previously created connection with a different client certificate. |
Ubuntu USN |
USN-3048-1 | curl vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T01:01:00.390Z
Reserved: 2016-06-10T00:00:00
Link: CVE-2016-5420
No data.
Status : Deferred
Published: 2016-08-10T14:59:05.080
Modified: 2025-04-12T10:46:40.837
Link: CVE-2016-5420
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN