First published: Mon Sep 05 2016(Updated: )
After testing original <a href="https://access.redhat.com/security/cve/CVE-2016-5420">CVE-2016-5420</a> patch, it was discovered that libcurl built on top of NSS (Network Security Services) still incorrectly re-uses client certificates if a certificate from file is used for one TLS connection but no certificate is set for a subsequent TLS connection. The original patch for <a href="https://access.redhat.com/security/cve/CVE-2016-5420">CVE-2016-5420</a> has been amended to also contain the attached patch: <a href="https://curl.haxx.se/CVE-2016-5420.patch">https://curl.haxx.se/CVE-2016-5420.patch</a>
Affected Software | Affected Version | How to fix |
---|---|---|
libcurl 3 with GnuTLS support | ||
Mozilla Network Security Services (NSS) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1373229 is critical due to the potential for client certificate re-use vulnerabilities leading to unauthorized access.
To fix REDHAT-BUG-1373229, ensure you are using the latest version of libcurl with the appropriate patches applied.
REDHAT-BUG-1373229 affects libcurl and Mozilla Network Security Services (NSS) configurations.
REDHAT-BUG-1373229 is associated with CVE-2016-5420, which addresses issues with client certificate re-use.
A temporary workaround for REDHAT-BUG-1373229 includes explicitly managing the client certificates to avoid re-use.