First published: Mon Jun 22 2015(Updated: )
cURL and libcurl 7.40.0 through 7.42.1 send the HTTP Basic authentication credentials for a previous connection when reusing a reset (curl_easy_reset) connection handle to send a request to the same host name, which allows remote attackers to obtain sensitive information via unspecified vectors.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
curl | =7.40.0 | |
curl | =7.41.0 | |
curl | =7.42.0 | |
curl | =7.42.1 | |
libcurl | =7.40.0 | |
libcurl | =7.41.0 | |
libcurl | =7.42.0 | |
libcurl | =7.42.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-3236 is considered to have a medium severity due to its potential to expose sensitive HTTP Basic authentication credentials.
To fix CVE-2015-3236, upgrade cURL and libcurl to version 7.43.0 or later, which includes the security patches.
CVE-2015-3236 affects cURL and libcurl versions 7.40.0 through 7.42.1 inclusive.
Attackers can exploit CVE-2015-3236 to potentially obtain HTTP Basic authentication credentials from previous connections.
Yes, CVE-2015-3236 affects both cURL and libcurl versions listed in the vulnerability details.