First published: Fri Apr 24 2015(Updated: )
cURL and libcurl 7.10.6 through 7.41.0 does not properly re-use NTLM connections, which allows remote attackers to connect as other users via an unauthenticated request, a similar issue to CVE-2014-0015.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Curl | =7.10.6 | |
Curl | =7.10.7 | |
Curl | =7.10.8 | |
Curl | =7.11.0 | |
Curl | =7.11.1 | |
Curl | =7.11.2 | |
Curl | =7.12.0 | |
Curl | =7.12.1 | |
Curl | =7.12.2 | |
Curl | =7.12.3 | |
Curl | =7.13.0 | |
Curl | =7.13.1 | |
Curl | =7.13.2 | |
Curl | =7.14.0 | |
Curl | =7.14.1 | |
Curl | =7.15.0 | |
Curl | =7.15.1 | |
Curl | =7.15.2 | |
Curl | =7.15.3 | |
Curl | =7.15.4 | |
Curl | =7.15.5 | |
Curl | =7.16.0 | |
Curl | =7.16.1 | |
Curl | =7.16.2 | |
Curl | =7.16.3 | |
Curl | =7.16.4 | |
Curl | =7.17.0 | |
Curl | =7.17.1 | |
Curl | =7.18.0 | |
Curl | =7.18.1 | |
Curl | =7.18.2 | |
Curl | =7.19.0 | |
Curl | =7.19.1 | |
Curl | =7.19.2 | |
Curl | =7.19.3 | |
Curl | =7.19.4 | |
Curl | =7.19.5 | |
Curl | =7.19.6 | |
Curl | =7.19.7 | |
Curl | =7.20.0 | |
Curl | =7.20.1 | |
Curl | =7.21.0 | |
Curl | =7.21.1 | |
Curl | =7.21.2 | |
Curl | =7.21.3 | |
Curl | =7.21.4 | |
Curl | =7.21.5 | |
Curl | =7.21.6 | |
Curl | =7.21.7 | |
Curl | =7.22.0 | |
Curl | =7.23.0 | |
Curl | =7.23.1 | |
Curl | =7.24.0 | |
Curl | =7.25.0 | |
Curl | =7.26.0 | |
Curl | =7.27.0 | |
Curl | =7.28.0 | |
Curl | =7.28.1 | |
Curl | =7.29.0 | |
Curl | =7.30.0 | |
Curl | =7.31.0 | |
Curl | =7.32.0 | |
Curl | =7.33.0 | |
Curl | =7.34.0 | |
Curl | =7.35.0 | |
Curl | =7.36.0 | |
Curl | =7.37.1 | |
Curl | =7.38.0 | |
Curl | =7.39.0 | |
Curl | =7.40.0 | |
Curl | =7.41.0 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =14.10 | |
Ubuntu | =15.04 | |
Debian | =7.0 | |
libcurl | =7.10.6 | |
libcurl | =7.10.7 | |
libcurl | =7.10.8 | |
libcurl | =7.11.0 | |
libcurl | =7.11.1 | |
libcurl | =7.11.2 | |
libcurl | =7.12.0 | |
libcurl | =7.12.1 | |
libcurl | =7.12.2 | |
libcurl | =7.12.3 | |
libcurl | =7.13.0 | |
libcurl | =7.13.1 | |
libcurl | =7.13.2 | |
libcurl | =7.14.0 | |
libcurl | =7.14.1 | |
libcurl | =7.15.0 | |
libcurl | =7.15.1 | |
libcurl | =7.15.2 | |
libcurl | =7.15.3 | |
libcurl | =7.15.4 | |
libcurl | =7.15.5 | |
libcurl | =7.16.0 | |
libcurl | =7.16.1 | |
libcurl | =7.16.2 | |
libcurl | =7.16.3 | |
libcurl | =7.16.4 | |
libcurl | =7.17.0 | |
libcurl | =7.17.1 | |
libcurl | =7.18.0 | |
libcurl | =7.18.1 | |
libcurl | =7.18.2 | |
libcurl | =7.19.0 | |
libcurl | =7.19.1 | |
libcurl | =7.19.2 | |
libcurl | =7.19.3 | |
libcurl | =7.19.4 | |
libcurl | =7.19.5 | |
libcurl | =7.19.6 | |
libcurl | =7.19.7 | |
libcurl | =7.20.0 | |
libcurl | =7.20.1 | |
libcurl | =7.21.0 | |
libcurl | =7.21.1 | |
libcurl | =7.21.2 | |
libcurl | =7.21.3 | |
libcurl | =7.21.4 | |
libcurl | =7.21.5 | |
libcurl | =7.21.6 | |
libcurl | =7.21.7 | |
libcurl | =7.22.0 | |
libcurl | =7.23.0 | |
libcurl | =7.23.1 | |
libcurl | =7.24.0 | |
libcurl | =7.25.0 | |
libcurl | =7.26.0 | |
libcurl | =7.27.0 | |
libcurl | =7.28.0 | |
libcurl | =7.28.1 | |
libcurl | =7.29.0 | |
libcurl | =7.30.0 | |
libcurl | =7.31.0 | |
libcurl | =7.32.0 | |
libcurl | =7.33.0 | |
libcurl | =7.34.0 | |
libcurl | =7.35.0 | |
libcurl | =7.36.0 | |
libcurl | =7.37.0 | |
libcurl | =7.37.1 | |
libcurl | =7.38.0 | |
libcurl | =7.39 | |
libcurl | =7.40.0 | |
libcurl | =7.41.0 | |
HP System Management Homepage | <=7.5.3.1 | |
Apple iOS and macOS | <=10.9.5 | |
Apple iOS and macOS | =10.10.0 | |
Apple iOS and macOS | =10.10.1 | |
Apple iOS and macOS | =10.10.2 | |
Apple iOS and macOS | =10.10.3 | |
Apple iOS and macOS | =10.10.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-3143 has a high severity rating as it allows remote attackers to authenticate as different users.
To fix CVE-2015-3143, you need to upgrade your cURL or libcurl to version 7.41.0 or later.
CVE-2015-3143 affects cURL and libcurl versions from 7.10.6 to 7.41.0.
CVE-2015-3143 is a connection-related vulnerability that impacts NTLM authentication.
Yes, CVE-2015-3143 can be exploited remotely without authentication.