First published: Tue Jun 07 2011(Updated: )
It was found that cURL performed client credentials delegation during the client-to-server GSS security mechanisms negotiation. A remote, rogue server could use this flaw to impersonate the cURL client (victim) against the correct (originally intended) server, potentially leading to denial of cURL tool services for victim client.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
libcurl | >=7.10.6<=7.21.6 | |
Apple iOS and macOS | <10.7.3 | |
Red Hat Fedora | =15 | |
Red Hat Fedora | =14 | |
Debian Linux | =5.0 | |
Debian Linux | =7.0 | |
Debian Linux | =6.0 | |
Ubuntu | =10.10 | |
Ubuntu | =11.04 | |
Ubuntu | =8.04 | |
Ubuntu | =10.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-2192 has been classified as a moderate severity vulnerability that could lead to impersonation of a cURL client.
To fix CVE-2011-2192, upgrade to a version of cURL that is newer than 7.21.6.
CVE-2011-2192 affects cURL versions between 7.10.6 and 7.21.6 inclusive.
CVE-2011-2192 affects various operating systems including specific versions of Debian, Fedora, Ubuntu, and macOS.
An attacker can exploit CVE-2011-2192 by impersonating a cURL client using a rogue server during the GSS security mechanisms negotiation.