MGASA-2015-0179

Source
https://advisories.mageia.org/MGASA-2015-0179.html
Import Source
https://advisories.mageia.org/MGASA-2015-0179.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2015-0179
Related
Published
2015-05-03T00:19:16Z
Modified
2015-05-03T00:07:23Z
Summary
Updated curl packages fix security vulnerabilities
Details

Updated curl packages fix security vulnerabilities:

NTLM-authenticated connections could be wrongly reused for requests without any credentials set, leading to HTTP requests being sent over the connection authenticated as a different user (CVE-2015-3143).

When parsing HTTP cookies, if the parsed cookie's "path" element consists of a single double-quote, libcurl would try to write to an invalid heap memory address. This could allow remote attackers to cause a denial of service (crash) (CVE-2015-3145).

When doing HTTP requests using the Negotiate authentication method along with NTLM, the connection used would not be marked as authenticated, making it possible to reuse it and send requests for one user over the connection authenticated as a different user (CVE-2015-3148).

References
Credits

Affected packages

Mageia:4 / curl

Package

Name
curl
Purl
pkg:rpm/mageia/curl?distro=mageia-4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
7.34.0-1.6.mga4

Ecosystem specific

{
    "section": "core"
}