UBUNTU-CVE-2015-3148

See a problem?
Source
https://ubuntu.com/security/notices/UBUNTU-CVE-2015-3148
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2015/UBUNTU-CVE-2015-3148.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2015-3148
Related
Published
2015-04-22T00:00:00Z
Modified
2015-04-22T00:00:00Z
Summary
[none]
Details

cURL and libcurl 7.10.6 through 7.41.0 do not properly re-use authenticated Negotiate connections, which allows remote attackers to connect as other users via a request.

References

Affected packages

Ubuntu:14.04:LTS / curl

Package

Name
curl
Purl
pkg:deb/ubuntu/curl@7.35.0-1ubuntu2.5?arch=src?distro=trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
7.35.0-1ubuntu2.5

Affected versions

7.*

7.32.0-1ubuntu1
7.33.0-1ubuntu1
7.34.0-1ubuntu1
7.35.0-1ubuntu1
7.35.0-1ubuntu2
7.35.0-1ubuntu2.1
7.35.0-1ubuntu2.2
7.35.0-1ubuntu2.3

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "medium",
    "binaries": [
        {
            "curl-udeb": "7.35.0-1ubuntu2.5",
            "curl": "7.35.0-1ubuntu2.5",
            "libcurl3-udeb": "7.35.0-1ubuntu2.5",
            "libcurl3": "7.35.0-1ubuntu2.5",
            "libcurl4-gnutls-dev": "7.35.0-1ubuntu2.5",
            "libcurl3-nss": "7.35.0-1ubuntu2.5",
            "libcurl4-doc": "7.35.0-1ubuntu2.5",
            "libcurl3-gnutls": "7.35.0-1ubuntu2.5",
            "libcurl3-dbg": "7.35.0-1ubuntu2.5",
            "libcurl4-nss-dev": "7.35.0-1ubuntu2.5",
            "libcurl4-openssl-dev": "7.35.0-1ubuntu2.5"
        }
    ]
}