A user can tell curl >= 7.20.0 and <= 7.78.0 to require a successful upgrade to TLS when speaking to an IMAP, POP3 or FTP server (--ssl-reqd on the command line orCURLOPT_USE_SSL set to CURLUSESSL_CONTROL or CURLUSESSL_ALL withlibcurl). This requirement could be bypassed if the server would return a properly crafted but perfectly legitimate response.This flaw would then make curl silently continue its operations withoutTLS contrary to the instructions and expectations, exposing possibly sensitive data in clear text over the network.
{
"unresolved_ranges": [
{
"source": "CPE_FIELD",
"cpes": [
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
],
"vendor_product": "apple:macos",
"extracted_events": [
{
"fixed": "12.3"
}
]
},
{
"source": "CPE_FIELD",
"cpes": [
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
],
"vendor_product": "debian:debian_linux",
"extracted_events": [
{
"last_affected": "9.0"
},
{
"last_affected": "10.0"
},
{
"last_affected": "11.0"
}
]
},
{
"source": "CPE_FIELD",
"cpes": [
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*"
],
"vendor_product": "fedoraproject:fedora",
"extracted_events": [
{
"last_affected": "33"
},
{
"last_affected": "35"
}
]
},
{
"source": "CPE_FIELD",
"cpes": [
"cpe:2.3:a:oracle:commerce_guided_search:11.3.2:*:*:*:*:*:*:*"
],
"vendor_product": "oracle:commerce_guided_search",
"extracted_events": [
{
"last_affected": "11.3.2"
}
]
},
{
"source": "CPE_FIELD",
"cpes": [
"cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:1.11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.1.3:*:*:*:*:*:*:*"
],
"vendor_product": "oracle:communications_cloud_native_core_binding_support_function",
"extracted_events": [
{
"last_affected": "1.11.0"
},
{
"last_affected": "22.1.3"
}
]
},
{
"source": "CPE_FIELD",
"cpes": [
"cpe:2.3:a:oracle:communications_cloud_native_core_console:22.2.0:*:*:*:*:*:*:*"
],
"vendor_product": "oracle:communications_cloud_native_core_console",
"extracted_events": [
{
"last_affected": "22.2.0"
}
]
},
{
"source": "CPE_FIELD",
"cpes": [
"cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:1.10.0:*:*:*:*:*:*:*"
],
"vendor_product": "oracle:communications_cloud_native_core_network_function_cloud_native_environment",
"extracted_events": [
{
"last_affected": "1.10.0"
}
]
},
{
"source": "CPE_FIELD",
"cpes": [
"cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:1.15.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:1.15.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:22.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:22.2.0:*:*:*:*:*:*:*"
],
"vendor_product": "oracle:communications_cloud_native_core_network_repository_function",
"extracted_events": [
{
"last_affected": "1.15.0"
},
{
"last_affected": "1.15.1"
},
{
"last_affected": "22.1.0"
},
{
"last_affected": "22.2.0"
}
]
},
{
"source": "CPE_FIELD",
"cpes": [
"cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:1.8.0:*:*:*:*:*:*:*"
],
"vendor_product": "oracle:communications_cloud_native_core_network_slice_selection_function",
"extracted_events": [
{
"last_affected": "1.8.0"
}
]
},
{
"source": "CPE_FIELD",
"cpes": [
"cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.1.1:*:*:*:*:*:*:*"
],
"vendor_product": "oracle:communications_cloud_native_core_security_edge_protection_proxy",
"extracted_events": [
{
"last_affected": "22.1.1"
}
]
},
{
"source": "CPE_FIELD",
"cpes": [
"cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:1.15.0:*:*:*:*:*:*:*"
],
"vendor_product": "oracle:communications_cloud_native_core_service_communication_proxy",
"extracted_events": [
{
"last_affected": "1.15.0"
}
]
},
{
"source": "CPE_FIELD",
"cpes": [
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.59:*:*:*:*:*:*:*"
],
"vendor_product": "oracle:peoplesoft_enterprise_peopletools",
"extracted_events": [
{
"last_affected": "8.57"
},
{
"last_affected": "8.58"
},
{
"last_affected": "8.59"
}
]
},
{
"source": "CPE_FIELD",
"cpes": [
"cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*"
],
"vendor_product": "siemens:sinec_infrastructure_network_services",
"extracted_events": [
{
"fixed": "1.0.1.1"
}
]
},
{
"source": "CPE_FIELD",
"cpes": [
"cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:*",
"cpe:2.3:a:splunk:universal_forwarder:9.1.0:*:*:*:*:*:*:*"
],
"vendor_product": "splunk:universal_forwarder",
"extracted_events": [
{
"introduced": "8.2.0"
},
{
"fixed": "8.2.12"
},
{
"introduced": "9.0.0"
},
{
"fixed": "9.0.6"
},
{
"last_affected": "9.1.0"
}
]
}
]
}