René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

183 lines
5.2 KiB
JSON

{
"id": "CVE-2016-7141",
"sourceIdentifier": "cve@mitre.org",
"published": "2016-10-03T21:59:08.300",
"lastModified": "2018-11-13T11:29:02.713",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "curl and libcurl before 7.50.2, when built with NSS and the libnsspem.so library is available at runtime, allow remote attackers to hijack the authentication of a TLS connection by leveraging reuse of a previously loaded client certificate from file for a connection for which no certificate has been set, a different vulnerability than CVE-2016-5420."
},
{
"lang": "es",
"value": "curl y libcurl en versiones anteriores a 7.50.2, cuando se construye con NSS y la librer\u00eda libnsspem.so est\u00e1 disponible en tiempo de ejecuci\u00f3n, permiten a atacantes remotos secuestrar la autenticaci\u00f3n de una conexi\u00f3n TLS aprovechando la reutilizaci\u00f3n de un certificado cliente cargado previamente desde un archivo para una conexi\u00f3n para el que no se ha configurado ning\u00fan certificado, una vulnerabilidad diferente a CVE-2016-5420."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4863BE36-D16A-4D75-90D9-FD76DB5B48B7"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*",
"versionEndIncluding": "7.50.1",
"matchCriteriaId": "EDD64F99-36C3-408B-BABA-94F0B7FAE474"
}
]
}
]
}
],
"references": [
{
"url": "http://lists.opensuse.org/opensuse-updates/2016-09/msg00094.html",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://rhn.redhat.com/errata/RHSA-2016-2575.html",
"source": "cve@mitre.org"
},
{
"url": "http://rhn.redhat.com/errata/RHSA-2016-2957.html",
"source": "cve@mitre.org"
},
{
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/92754",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securitytracker.com/id/1036739",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2018:3558",
"source": "cve@mitre.org"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1373229",
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://curl.haxx.se/docs/adv_20160907.html",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory",
"Patch"
]
},
{
"url": "https://github.com/curl/curl/commit/curl-7_50_2~32",
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html",
"source": "cve@mitre.org"
},
{
"url": "https://security.gentoo.org/glsa/201701-47",
"source": "cve@mitre.org"
}
]
}