MGASA-2014-0153

Source
https://advisories.mageia.org/MGASA-2014-0153.html
Import Source
https://advisories.mageia.org/MGASA-2014-0153.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2014-0153
Related
Published
2014-04-03T00:56:35Z
Modified
2014-04-03T00:56:23Z
Summary
Updated curl packages fix multiple vulnerabilities
Details

Updated curl packages fix security vulnerabilities:

Paras Sethia discovered that libcurl would sometimes mix up multiple HTTP and HTTPS connections with NTLM authentication to the same server, sending requests for one user over the connection authenticated as a different user (CVE-2014-0015).

libcurl can in some circumstances re-use the wrong connection when asked to do transfers using other protocols than HTTP and FTP, causing a transfer that was initiated by an application to wrongfully re-use an existing connection to the same server that was authenticated using different credentials (CVE-2014-0138).

libcurl incorrectly validates wildcard SSL certificates containing literal IP addresses, so under certain conditions, it would allow and use a wildcard match specified in the CN field, allowing a malicious server to participate in a MITM attack or just fool users into believing that it is a legitimate site (CVE-2014-0139).

References
Credits

Affected packages

Mageia:3 / curl

Package

Name
curl
Purl
pkg:rpm/mageia/curl?distro=mageia-3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
7.28.1-6.4.mga3

Ecosystem specific

{
    "section": "core"
}

Mageia:4 / curl

Package

Name
curl
Purl
pkg:rpm/mageia/curl?distro=mageia-4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
7.34.0-1.2.mga4

Ecosystem specific

{
    "section": "core"
}