First published: Mon Sep 05 2016(Updated: )
curl and libcurl before 7.50.2, when built with NSS and the libnsspem.so library is available at runtime, allow remote attackers to hijack the authentication of a TLS connection by leveraging reuse of a previously loaded client certificate from file for a connection for which no certificate has been set, a different vulnerability than CVE-2016-5420.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
openSUSE | =42.1 | |
libcurl | <=7.50.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-7141 is considered a moderate severity vulnerability that can allow remote attack vectors.
To fix CVE-2016-7141, update curl or libcurl to version 7.50.2 or later.
CVE-2016-7141 affects curl and libcurl versions prior to 7.50.2 when built with NSS.
Yes, CVE-2016-7141 allows remote attackers to potentially hijack authentication through reused client certificates.
The vulnerable systems include openSUSE Leap 42.1 and libcurl versions up to 7.50.1.