CURL-CVE-2014-0015

Source
https://curl.se/docs/CVE-2014-0015.html
Import Source
https://curl.se/docs/CURL-CVE-2014-0015.json
JSON Data
https://api.test.osv.dev/v1/vulns/CURL-CVE-2014-0015
Aliases
Published
2014-01-29T08:00:00Z
Modified
2026-05-19T09:30:11.768022541Z
Summary
reuse of wrong HTTP NTLM connection
Details

libcurl can in some circumstances reuse the wrong connection when asked to do an NTLM-authenticated HTTP or HTTPS request.

libcurl features a pool of recent connections so that subsequent requests can reuse an existing connection to avoid overhead.

When reusing a connection a range of criterion must first be met. Due to a logical error in the code, a request that was issued by an application could wrongfully reuse an existing connection to the same server that was authenticated using different credentials. One underlying reason being that NTLM authenticates connections and not requests, contrary to how HTTP is designed to work and how other authentication methods work.

An application that allows NTLM and another auth method (the bug only triggers if more than one auth method is asked for) to a server (that responds wanting NTLM) with user1:password1 and then does another operation to the same server with user2:password2 (when the previous connection was left alive) - the second request reuses the same connection and since it then sees that the NTLM negotiation is already made, it sends the request over that connection thinking it uses the user2 credentials when it is in fact still using the connection authenticated for user1...

The set of auth methods to use is set with CURLOPT_HTTPAUTH.

Two common auth defines in libcurl are CURLAUTH_ANY and CURLAUTH_ANYSAFE. Both of them ask for NTLM and other methods and can therefore trigger this problem.

Applications can disable libcurl's reuse of connections and thus mitigate this problem, by using one of the following libcurl options to alter how connections are or are not reused: CURLOPT_FRESH_CONNECT, CURLOPT_MAXCONNECTS and CURLMOPT_MAX_HOST_CONNECTIONS (if using the curl_multi API).

Database specific
{
    "last_affected": "7.34.0",
    "affects": "both",
    "URL": "https://curl.se/docs/CVE-2014-0015.json",
    "severity": "Medium",
    "CWE": {
        "desc": "Authentication Bypass by Primary Weakness",
        "id": "CWE-305"
    },
    "www": "https://curl.se/docs/CVE-2014-0015.html",
    "package": "curl"
}
References
Credits
    • Paras Sethia - FINDER
    • Daniel Stenberg - REMEDIATION_DEVELOPER
    • Yehezkel Horowitz - OTHER

Affected packages

Git / github.com/curl/curl.git

Affected ranges

Type
SEMVER
Events
Introduced
7.10.6
Fixed
7.35.0
Type
GIT
Repo
https://github.com/curl/curl.git
Events

Affected versions

7.*
7.10.6
7.10.7
7.10.8
7.11.0
7.11.1
7.11.2
7.12.0
7.12.1
7.12.2
7.12.3
7.13.0
7.13.1
7.13.2
7.14.0
7.14.1
7.15.0
7.15.1
7.15.2
7.15.3
7.15.4
7.15.5
7.16.0
7.16.1
7.16.2
7.16.3
7.16.4
7.17.0
7.17.1
7.18.0
7.18.1
7.18.2
7.19.0
7.19.1
7.19.2
7.19.3
7.19.4
7.19.5
7.19.6
7.19.7
7.20.0
7.20.1
7.21.0
7.21.1
7.21.2
7.21.3
7.21.4
7.21.5
7.21.6
7.21.7
7.22.0
7.23.0
7.23.1
7.24.0
7.25.0
7.26.0
7.27.0
7.28.0
7.28.1
7.29.0
7.30.0
7.31.0
7.32.0
7.33.0
7.34.0
Other
before_ftp_statemachine
curl-7_10_6
curl-7_10_7
curl-7_10_8
curl-7_11_0
curl-7_11_1
curl-7_11_2
curl-7_12_0
curl-7_12_1
curl-7_12_2
curl-7_12_3
curl-7_13_0
curl-7_13_1
curl-7_13_2
curl-7_14_0
curl-7_14_1
curl-7_15_0
curl-7_15_1
curl-7_15_2
curl-7_15_3
curl-7_15_4
curl-7_15_5
curl-7_15_6-prepipeline
curl-7_16_0
curl-7_16_1
curl-7_16_2
curl-7_16_3
curl-7_16_4
curl-7_17_0
curl-7_17_0-preldapfix
curl-7_17_1
curl-7_18_0
curl-7_18_1
curl-7_18_2
curl-7_19_0
curl-7_19_1
curl-7_19_2
curl-7_19_3
curl-7_19_4
curl-7_19_5
curl-7_19_6
curl-7_19_7
curl-7_20_0
curl-7_20_1
curl-7_21_0
curl-7_21_1
curl-7_21_2
curl-7_21_3
curl-7_21_4
curl-7_21_5
curl-7_21_6
curl-7_21_7
curl-7_22_0
curl-7_23_0
curl-7_23_1
curl-7_25_0
curl-7_26_0
curl-7_27_0
curl-7_28_0
curl-7_28_1
curl-7_29_0
curl-7_30_0
curl-7_31_0
curl-7_32_0
curl-7_33_0
curl-7_34_0

Database specific

source
"https://curl.se/docs/CURL-CVE-2014-0015.json"