First published: Wed Jan 31 2024(Updated: )
curl inadvertently kept the SSL session ID for connections in its cache even when the verify status (*OCSP stapling*) test failed. A subsequent transfer to the same hostname could then succeed if the session ID cache was still fresh, which then skipped the verify status check.
Credit: 2499f714-1537-4658-8207-48ae4bb9eae9
Affected Software | Affected Version | How to fix |
---|---|---|
Curl | =8.5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-0853 has been classified with moderate severity due to potential risks in SSL session ID caching.
To fix CVE-2024-0853, update your curl to version 8.5.1 or later where the caching issue has been resolved.
CVE-2024-0853 affects curl version 8.5.0 that can lead to bypassing SSL verification.
No, CVE-2024-0853 does not present a remote code execution vulnerability but poses a risk of SSL verification bypass.
If exploited, CVE-2024-0853 may allow a successful connection to a potentially compromised server without proper SSL verification.