Vulnerability Details : CVE-2016-5421
Use-after-free vulnerability in libcurl before 7.50.1 allows attackers to control which connection is used or possibly have unspecified other impact via unknown vectors.
Vulnerability category: Memory Corruption
Exploit prediction scoring system (EPSS) score for CVE-2016-5421
Probability of exploitation activity in the next 30 days: 0.73%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 79 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2016-5421
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST |
8.1
|
HIGH | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |
2.2
|
5.9
|
NIST |
CWE ids for CVE-2016-5421
-
Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.Assigned by: nvd@nist.gov (Primary)
References for CVE-2016-5421
-
http://lists.opensuse.org/opensuse-updates/2016-09/msg00011.html
openSUSE-SU-2016:2227-1: moderate: Security update for curlThird Party Advisory
-
https://security.gentoo.org/glsa/201701-47
cURL: Multiple vulnerabilities (GLSA 201701-47) — Gentoo securityThird Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K3GQH4V3XAQ5Z53AMQRDEC3C3UHTW7QR/
[SECURITY] Fedora 23 Update: curl-7.43.0-8.fc23 - package-announce - Fedora Mailing-ListsThird Party Advisory
-
https://source.android.com/security/bulletin/2016-12-01.html
Android Security Bulletin—December 2016 | Android Open Source ProjectThird Party Advisory
-
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
CPU Oct 2018Patch;Third Party Advisory
-
http://www.securitytracker.com/id/1036536
libcurl Use-After-Free Connection Flaw May Let Local Users Gain Elevated Privileges - SecurityTrackerThird Party Advisory;VDB Entry
-
https://curl.haxx.se/docs/adv_20160803C.html
curl - use of connection struct after free - CVE-2016-5421Mitigation;Vendor Advisory
-
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.563059
The Slackware Linux Project: Slackware Security AdvisoriesThird Party Advisory
-
http://www.securityfocus.com/bid/92306
cURL/libcurl CVE-2016-5421 Local Use After Free Denial of Service VulnerabilityThird Party Advisory;VDB Entry
-
http://www.ubuntu.com/usn/USN-3048-1
USN-3048-1: curl vulnerabilities | Ubuntu security noticesThird Party Advisory
-
https://access.redhat.com/errata/RHSA-2018:3558
RHSA-2018:3558 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://www.tenable.com/security/tns-2016-18
[R7] LCE 4.8.1 Fixes Multiple Vulnerabilities - Security Advisory | Tenable®Third Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GLPXQQKURBQFM4XM6645VRPTOE2AWG33/
[SECURITY] Fedora 24 Update: curl-7.47.1-6.fc24 - package-announce - Fedora Mailing-ListsThird Party Advisory
-
http://www.debian.org/security/2016/dsa-3638
Debian -- Security Information -- DSA-3638-1 curlThird Party Advisory
-
http://lists.opensuse.org/opensuse-updates/2016-09/msg00094.html
openSUSE-SU-2016:2379-1: moderate: Security update for curlThird Party Advisory
Products affected by CVE-2016-5421
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
- cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*