Vulnerability Details : CVE-2016-7141
curl and libcurl before 7.50.2, when built with NSS and the libnsspem.so library is available at runtime, allow remote attackers to hijack the authentication of a TLS connection by leveraging reuse of a previously loaded client certificate from file for a connection for which no certificate has been set, a different vulnerability than CVE-2016-5420.
Vulnerability category: BypassGain privilege
Products affected by CVE-2016-7141
- cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2016-7141
0.36%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 68 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2016-7141
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:P/A:N |
10.0
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2016-7141
-
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.Assigned by: nvd@nist.gov (Primary)
References for CVE-2016-7141
-
https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html
[SECURITY] [DLA 1568-1] curl security update
-
https://security.gentoo.org/glsa/201701-47
cURL: Multiple vulnerabilities (GLSA 201701-47) — Gentoo security
-
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
CPU Oct 2018
-
http://rhn.redhat.com/errata/RHSA-2016-2957.html
RHSA-2016:2957 - Security Advisory - Red Hat Customer Portal
-
https://github.com/curl/curl/commit/curl-7_50_2~32
nss: refuse previously loaded certificate from file · curl/curl@7700fcb · GitHubIssue Tracking;Patch
-
https://curl.haxx.se/docs/adv_20160907.html
curl - Incorrect reuse of client certificates - CVE-2016-7141Vendor Advisory;Patch
-
https://access.redhat.com/errata/RHSA-2018:3558
RHSA-2018:3558 - Security Advisory - Red Hat Customer Portal
-
https://bugzilla.redhat.com/show_bug.cgi?id=1373229
1373229 – (CVE-2016-7141) CVE-2016-7141 curl: Incorrect reuse of client certificatesIssue Tracking
-
http://www.securitytracker.com/id/1036739
cURL/libcurl Certificate Reuse Bug Lets Remote Users Bypass Security Restrictions on the Target System - SecurityTrackerThird Party Advisory;VDB Entry
-
http://www.securityfocus.com/bid/92754
cURL/libcURL CVE-2016-7141 Certificate Validation Security Bypass VulnerabilityThird Party Advisory;VDB Entry
-
http://rhn.redhat.com/errata/RHSA-2016-2575.html
RHSA-2016:2575 - Security Advisory - Red Hat Customer Portal
-
http://lists.opensuse.org/opensuse-updates/2016-09/msg00094.html
openSUSE-SU-2016:2379-1: moderate: Security update for curlThird Party Advisory
Jump to