First published: Fri Jan 29 2016(Updated: )
The ConnectionExists function in lib/url.c in libcurl before 7.47.0 does not properly re-use NTLM-authenticated proxy connections, which might allow remote attackers to authenticate as other users via a request, a similar issue to CVE-2014-0015.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
curl | <=7.46.0 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =15.04 | |
Ubuntu | =15.10 | |
Debian | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-0755 is classified as a medium severity vulnerability.
To fix CVE-2016-0755, you should upgrade to libcurl version 7.47.0 or later.
Libcurl versions prior to 7.47.0, particularly 7.46.0 and earlier, are affected by CVE-2016-0755.
CVE-2016-0755 impacts various Linux distributions including affected versions of Ubuntu and Debian.
CVE-2016-0755 is associated with remote attackers potentially authenticating as other users through improper reuse of NTLM-authenticated proxy connections.