CVE-2016-8624
Publication date 2 November 2016
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
curl before version 7.51.0 doesn't parse the authority component of the URL correctly when the host name part ends with a '#' character, and could instead be tricked into connecting to a different host. This may have security implications if you for example use an URL parser that follows the RFC to check for allowed domains before using curl to request them.
Status
Package | Ubuntu Release | Status |
---|---|---|
curl | ||
16.04 LTS xenial |
Fixed 7.47.0-1ubuntu2.2
|
|
14.04 LTS trusty |
Fixed 7.35.0-1ubuntu2.10
|
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.5 · High |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | High |
Availability impact | None |
Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N |
References
Related Ubuntu Security Notices (USN)
- USN-3123-1
- curl vulnerabilities
- 3 November 2016