First published: Mon Aug 01 2016(Updated: )
curl and libcurl before 7.50.1 do not prevent TLS session resumption when the client certificate has changed, which allows remote attackers to bypass intended restrictions by resuming a session.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/curl | <7.50.1 | 7.50.1 |
Android | ||
libcurl | <=7.50.0 | |
Debian Linux | =8.0 | |
SUSE Linux | =42.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-5419 is categorized as a medium severity vulnerability.
To fix CVE-2016-5419, update curl and libcurl to version 7.50.1 or newer.
CVE-2016-5419 affects curl and libcurl versions prior to 7.50.1.
CVE-2016-5419 allows remote attackers to bypass security restrictions by resuming a TLS session with a changed client certificate.
Yes, CVE-2016-5419 is present in Debian GNU/Linux 8.0 and needs to be addressed by updating the software.