First published: Tue Oct 25 2016(Updated: )
A flaw was found in curl before version 7.51.0 When re-using a connection, curl was doing case insensitive comparisons of user name and password with the existing connections. This means that if an unused connection with proper credentials exists for a protocol that has connection-scoped credentials, an attacker can cause that connection to be reused if s/he knows the case-insensitive version of the correct password.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/curl | <7.51.0 | 7.51.0 |
Curl | <7.51.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-8616 has a medium severity rating due to the potential for unauthorized access through credential reuse.
To fix CVE-2016-8616, upgrade curl to version 7.51.0 or later.
CVE-2016-8616 affects all versions of curl prior to 7.51.0.
The components impacted by CVE-2016-8616 are the user authentication mechanisms within curl.
Yes, CVE-2016-8616 is related to connection security as it involves improper credential comparison during connection reuse.