First published: Tue Jun 07 2011(Updated: )
It was found that cURL performed client credentials delegation during the client-to-server GSS security mechanisms negotiation. A remote, rogue server could use this flaw to impersonate the cURL client (victim) against the correct (originally intended) server, potentially leading to denial of cURL tool services for victim client.
Affected Software | Affected Version | How to fix |
---|---|---|
Curl |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-711454 is classified as important due to potential impersonation risks.
To fix REDHAT-BUG-711454, it is recommended to update to the latest version of cURL that addresses this vulnerability.
Users of cURL implementing GSS security mechanisms are affected by REDHAT-BUG-711454.
If REDHAT-BUG-711454 is exploited, a rogue server could impersonate the cURL client, leading to denial of service.
Versions of cURL prior to the security patch addressing REDHAT-BUG-711454 are vulnerable.