ALT-PU-2015-1555-1
Closed vulnerabilities
Published: 2015-06-22
Modified: 2024-11-21
Modified: 2024-11-21
CVE-2015-3236
cURL and libcurl 7.40.0 through 7.42.1 send the HTTP Basic authentication credentials for a previous connection when reusing a reset (curl_easy_reset) connection handle to send a request to the same host name, which allows remote attackers to obtain sensitive information via unspecified vectors.
Severity: MEDIUM (5.0)
References:
- http://curl.haxx.se/docs/adv_20150617A.html
- http://curl.haxx.se/docs/adv_20150617A.html
- FEDORA-2015-10155
- FEDORA-2015-10155
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- 75385
- 75385
- 91787
- 91787
- https://kc.mcafee.com/corporate/index?page=content&id=SB10131
- https://kc.mcafee.com/corporate/index?page=content&id=SB10131
- GLSA-201509-02
- GLSA-201509-02
Published: 2015-06-22
Modified: 2024-11-21
Modified: 2024-11-21
CVE-2015-3237
The smb_request_state function in cURL and libcurl 7.40.0 through 7.42.1 allows remote SMB servers to obtain sensitive information from memory or cause a denial of service (out-of-bounds read and crash) via crafted length and offset values.
Severity: MEDIUM (6.4)
References:
- http://curl.haxx.se/docs/adv_20150617B.html
- http://curl.haxx.se/docs/adv_20150617B.html
- FEDORA-2015-10155
- FEDORA-2015-10155
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 75387
- 75387
- 91787
- 91787
- 1036371
- 1036371
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05111017
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05111017
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
- GLSA-201509-02
- GLSA-201509-02