ALT-PU-2015-1555-1
Closed vulnerabilities
Published: 2015-06-22
Modified: 2025-04-12
Modified: 2025-04-12
CVE-2015-3236
cURL and libcurl 7.40.0 through 7.42.1 send the HTTP Basic authentication credentials for a previous connection when reusing a reset (curl_easy_reset) connection handle to send a request to the same host name, which allows remote attackers to obtain sensitive information via unspecified vectors.
Severity: MEDIUM (5.0)
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
References:
- http://curl.haxx.se/docs/adv_20150617A.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160660.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.securityfocus.com/bid/75385
- http://www.securityfocus.com/bid/91787
- https://kc.mcafee.com/corporate/index?page=content&id=SB10131
- https://security.gentoo.org/glsa/201509-02
- http://curl.haxx.se/docs/adv_20150617A.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160660.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.securityfocus.com/bid/75385
- http://www.securityfocus.com/bid/91787
- https://kc.mcafee.com/corporate/index?page=content&id=SB10131
- https://security.gentoo.org/glsa/201509-02
Published: 2015-06-22
Modified: 2025-04-12
Modified: 2025-04-12
CVE-2015-3237
The smb_request_state function in cURL and libcurl 7.40.0 through 7.42.1 allows remote SMB servers to obtain sensitive information from memory or cause a denial of service (out-of-bounds read and crash) via crafted length and offset values.
Severity: MEDIUM (6.4)
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P
References:
- http://curl.haxx.se/docs/adv_20150617B.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160660.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.securityfocus.com/bid/75387
- http://www.securityfocus.com/bid/91787
- http://www.securitytracker.com/id/1036371
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05111017
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
- https://security.gentoo.org/glsa/201509-02
- http://curl.haxx.se/docs/adv_20150617B.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160660.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.securityfocus.com/bid/75387
- http://www.securityfocus.com/bid/91787
- http://www.securitytracker.com/id/1036371
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05111017
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
- https://security.gentoo.org/glsa/201509-02