Updated curl packages fix multiple vulnerabilities
Publication date: 03 Apr 2014Modification date: 03 Apr 2014
Type: security
Affected Mageia releases : 3 , 4
CVE: CVE-2014-0015 , CVE-2014-0138 , CVE-2014-0139
Description
Updated curl packages fix security vulnerabilities: Paras Sethia discovered that libcurl would sometimes mix up multiple HTTP and HTTPS connections with NTLM authentication to the same server, sending requests for one user over the connection authenticated as a different user (CVE-2014-0015). libcurl can in some circumstances re-use the wrong connection when asked to do transfers using other protocols than HTTP and FTP, causing a transfer that was initiated by an application to wrongfully re-use an existing connection to the same server that was authenticated using different credentials (CVE-2014-0138). libcurl incorrectly validates wildcard SSL certificates containing literal IP addresses, so under certain conditions, it would allow and use a wildcard match specified in the CN field, allowing a malicious server to participate in a MITM attack or just fool users into believing that it is a legitimate site (CVE-2014-0139).
References
- http://curl.haxx.se/docs/adv_20140129.html
- http://curl.haxx.se/docs/adv_20140326A.html
- http://curl.haxx.se/docs/adv_20140326B.html
- http://www.debian.org/security/2014/dsa-2849
- https://bugs.mageia.org/show_bug.cgi?id=12476
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0015
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0138
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0139
SRPMS
3/core
- curl-7.28.1-6.4.mga3
4/core
- curl-7.34.0-1.2.mga4