UBUNTU-CVE-2014-8150

See a problem?
Source
https://ubuntu.com/security/notices/UBUNTU-CVE-2014-8150
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2014/UBUNTU-CVE-2014-8150.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2014-8150
Related
Published
2015-01-08T00:00:00Z
Modified
2015-01-08T00:00:00Z
Summary
[none]
Details

CRLF injection vulnerability in libcurl 6.0 through 7.x before 7.40.0, when using an HTTP proxy, allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via CRLF sequences in a URL.

References

Affected packages

Ubuntu:14.04:LTS / curl

Package

Name
curl
Purl
pkg:deb/ubuntu/curl@7.35.0-1ubuntu2.3?arch=src?distro=trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
7.35.0-1ubuntu2.3

Affected versions

7.*

7.32.0-1ubuntu1
7.33.0-1ubuntu1
7.34.0-1ubuntu1
7.35.0-1ubuntu1
7.35.0-1ubuntu2
7.35.0-1ubuntu2.1
7.35.0-1ubuntu2.2

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "medium",
    "binaries": [
        {
            "curl-udeb": "7.35.0-1ubuntu2.3",
            "curl": "7.35.0-1ubuntu2.3",
            "libcurl3-udeb": "7.35.0-1ubuntu2.3",
            "libcurl3": "7.35.0-1ubuntu2.3",
            "libcurl4-gnutls-dev": "7.35.0-1ubuntu2.3",
            "libcurl3-nss": "7.35.0-1ubuntu2.3",
            "libcurl4-doc": "7.35.0-1ubuntu2.3",
            "libcurl3-gnutls": "7.35.0-1ubuntu2.3",
            "libcurl3-dbg": "7.35.0-1ubuntu2.3",
            "libcurl4-nss-dev": "7.35.0-1ubuntu2.3",
            "libcurl4-openssl-dev": "7.35.0-1ubuntu2.3"
        }
    ]
}