First published: Thu Jan 15 2015(Updated: )
CRLF injection vulnerability in libcurl 6.0 through 7.x before 7.40.0, when using an HTTP proxy, allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via CRLF sequences in a URL.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Debian | =7.0 | |
libcurl | =6.0 | |
libcurl | =6.1 | |
libcurl | =6.1-beta | |
libcurl | =6.2 | |
libcurl | =6.3 | |
libcurl | =6.3.1 | |
libcurl | =6.4 | |
libcurl | =6.5 | |
libcurl | =6.5.1 | |
libcurl | =6.5.2 | |
libcurl | =7.1 | |
libcurl | =7.1.1 | |
libcurl | =7.2 | |
libcurl | =7.2.1 | |
libcurl | =7.3 | |
libcurl | =7.4 | |
libcurl | =7.4.1 | |
libcurl | =7.4.2 | |
libcurl | =7.5 | |
libcurl | =7.5.1 | |
libcurl | =7.5.2 | |
libcurl | =7.6 | |
libcurl | =7.6.1 | |
libcurl | =7.7 | |
libcurl | =7.7.1 | |
libcurl | =7.7.2 | |
libcurl | =7.7.3 | |
libcurl | =7.8 | |
libcurl | =7.8.1 | |
libcurl | =7.9 | |
libcurl | =7.9.1 | |
libcurl | =7.9.2 | |
libcurl | =7.9.3 | |
libcurl | =7.9.4 | |
libcurl | =7.9.5 | |
libcurl | =7.9.6 | |
libcurl | =7.9.7 | |
libcurl | =7.9.8 | |
libcurl | =7.10 | |
libcurl | =7.10.1 | |
libcurl | =7.10.2 | |
libcurl | =7.10.3 | |
libcurl | =7.10.4 | |
libcurl | =7.10.5 | |
libcurl | =7.10.6 | |
libcurl | =7.10.7 | |
libcurl | =7.10.8 | |
libcurl | =7.11.0 | |
libcurl | =7.11.1 | |
libcurl | =7.11.2 | |
libcurl | =7.12.0 | |
libcurl | =7.12.1 | |
libcurl | =7.12.2 | |
libcurl | =7.12.3 | |
libcurl | =7.13.0 | |
libcurl | =7.13.1 | |
libcurl | =7.13.2 | |
libcurl | =7.14.0 | |
libcurl | =7.14.1 | |
libcurl | =7.15.0 | |
libcurl | =7.15.1 | |
libcurl | =7.15.2 | |
libcurl | =7.15.3 | |
libcurl | =7.15.4 | |
libcurl | =7.15.5 | |
libcurl | =7.16.0 | |
libcurl | =7.16.1 | |
libcurl | =7.16.2 | |
libcurl | =7.16.3 | |
libcurl | =7.16.4 | |
libcurl | =7.17.0 | |
libcurl | =7.17.1 | |
libcurl | =7.18.0 | |
libcurl | =7.18.1 | |
libcurl | =7.18.2 | |
libcurl | =7.19.0 | |
libcurl | =7.19.1 | |
libcurl | =7.19.2 | |
libcurl | =7.19.3 | |
libcurl | =7.19.4 | |
libcurl | =7.19.5 | |
libcurl | =7.19.6 | |
libcurl | =7.19.7 | |
libcurl | =7.20.0 | |
libcurl | =7.20.1 | |
libcurl | =7.21.0 | |
libcurl | =7.21.1 | |
libcurl | =7.21.2 | |
libcurl | =7.21.3 | |
libcurl | =7.21.4 | |
libcurl | =7.21.5 | |
libcurl | =7.21.6 | |
libcurl | =7.21.7 | |
libcurl | =7.22.0 | |
libcurl | =7.23.0 | |
libcurl | =7.23.1 | |
libcurl | =7.24.0 | |
libcurl | =7.25.0 | |
libcurl | =7.26.0 | |
libcurl | =7.27.0 | |
libcurl | =7.28.0 | |
libcurl | =7.28.1 | |
libcurl | =7.29.0 | |
libcurl | =7.30.0 | |
libcurl | =7.31.0 | |
libcurl | =7.32.0 | |
libcurl | =7.33.0 | |
libcurl | =7.34.0 | |
libcurl | =7.35.0 | |
libcurl | =7.36.0 | |
libcurl | =7.37.0 | |
libcurl | =7.37.1 | |
libcurl | =7.38.0 | |
libcurl | =7.39 | |
Ubuntu | =10.04 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =14.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-8150 is classified as a medium severity vulnerability due to its potential for HTTP response splitting attacks.
To fix CVE-2014-8150, upgrade libcurl to version 7.40.0 or later, which contains the necessary security patches.
CVE-2014-8150 affects libcurl versions from 6.0 through 7.x before 7.40.0, as well as specific distributions like Debian and Ubuntu.
CVE-2014-8150 can facilitate HTTP response splitting attacks by allowing remote attackers to inject arbitrary HTTP headers.
Yes, CVE-2014-8150 specifically affects libcurl versions 6.0 through 7.x before 7.40.0.