7.5
CWE
295
Advisory Published
Updated

CVE-2017-7468

First published: Mon Jul 16 2018(Updated: )

In curl and libcurl 7.52.0 to and including 7.53.1, libcurl would attempt to resume a TLS session even if the client certificate had changed. That is unacceptable since a server by specification is allowed to skip the client certificate check on resume, and may instead use the old identity which was established by the previous certificate (or no certificate). libcurl supports by default the use of TLS session id/ticket to resume previous TLS sessions to speed up subsequent TLS handshakes. They are used when for any reason an existing TLS connection couldn't be kept alive to make the next handshake faster. This flaw is a regression and identical to CVE-2016-5419 reported on August 3rd 2016, but affecting a different version range.

Credit: secalert@redhat.com

Affected SoftwareAffected VersionHow to fix
Haxx Libcurl>=7.52.0<=7.53.1

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2017-7468?

    CVE-2017-7468 is a vulnerability in curl and libcurl versions 7.52.0 to 7.53.1.

  • What is the severity of CVE-2017-7468?

    CVE-2017-7468 has a severity rating of 7.5 (high).

  • What is the affected software for CVE-2017-7468?

    The affected software is Haxx Libcurl version 7.52.0 to 7.53.1.

  • What is the CWE for CVE-2017-7468?

    The CWE for CVE-2017-7468 is CWE-295.

  • How can I fix CVE-2017-7468?

    To fix CVE-2017-7468, you should upgrade curl and libcurl to versions higher than 7.53.1.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203