First published: Tue Nov 18 2014(Updated: )
cURL and libcurl before 7.38.0 does not properly handle IP addresses in cookie domain names, which allows remote attackers to set cookies for or send arbitrary cookies to certain sites, as demonstrated by a site at 192.168.0.1 setting cookies for a site at 127.168.0.1.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
curl | <=7.37.1 | |
curl | =7.31.0 | |
curl | =7.32.0 | |
curl | =7.33.0 | |
curl | =7.34.0 | |
curl | =7.35.0 | |
curl | =7.36.0 | |
curl | =7.37.0 | |
libcurl | <=7.37.1 | |
libcurl | =7.31.0 | |
libcurl | =7.32.0 | |
libcurl | =7.33.0 | |
libcurl | =7.34.0 | |
libcurl | =7.35.0 | |
libcurl | =7.36.0 | |
libcurl | =7.37.0 | |
Apple iOS and macOS | <=10.10.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3613 has a medium severity rating due to its potential to allow cookie manipulation by remote attackers.
To fix CVE-2014-3613, upgrade to cURL and libcurl version 7.38.0 or later.
CVE-2014-3613 affects cURL and libcurl versions prior to 7.38.0, including 7.31.0 through 7.37.1.
CVE-2014-3613 can be exploited to send arbitrary cookies to vulnerable sites, potentially leading to session hijacking.
No, CVE-2014-3613 affects all operating systems that run affected versions of cURL and libcurl.