Description
Multiple serious vulnerabilities have been found in cURL. Malicious users can exploit these vulnerabilities to bypass security restrictions.
Below is a complete list of vulnerabilities
- Use-after-free vulnerability can be exploited to control which connection is used;
- An improper TLS connection reuse handling can be exploited remotely via connection manipulations to hijack authentication;
- An improper TLS certificate change handling can be exploited remotely via connection manipulations to bypass security restrictions.
Technical details
The curl command line tool is also affected because of these flaws.
All vulnerabilities were found in libcurl library.
Original advisories
Related products
CVE list
- CVE-2016-5421 high
- CVE-2016-5420 warning
- CVE-2016-5419 warning
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!