CVE-2017-7468
Summary
| CVE | CVE-2017-7468 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2018-07-16 13:29:00 UTC |
| Updated | 2019-10-09 23:29:00 UTC |
| Description | In curl and libcurl 7.52.0 to and including 7.53.1, libcurl would attempt to resume a TLS session even if the client certificate had changed. That is unacceptable since a server by specification is allowed to skip the client certificate check on resume, and may instead use the old identity which was established by the previous certificate (or no certificate). libcurl supports by default the use of TLS session id/ticket to resume previous TLS sessions to speed up subsequent TLS handshakes. They are used when for any reason an existing TLS connection couldn't be kept alive to make the next handshake faster. This flaw is a regression and identical to CVE-2016-5419 reported on August 3rd 2016, but affecting a different version range. |
Risk And Classification
Problem Types: CWE-295
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| curl - TLS session resumption client cert bypass | CONFIRM | curl.haxx.se | Vendor Advisory |
| cURL: Multiple vulnerabilities (GLSA 201709-14) — Gentoo Security | GENTOO | security.gentoo.org | Third Party Advisory |
| cURL/libcurl TLS Session Resumption Client Certificate Bug Lets Remote Users Bypass Security Restrictions on the Target System - SecurityTracker | SECTRACK | www.securitytracker.com | Third Party Advisory, VDB Entry |
| 1443381 – (CVE-2017-7468) CVE-2017-7468 curl: TLS session resumption client cert bypass | CONFIRM | bugzilla.redhat.com | Issue Tracking, Third Party Advisory |
| cURL/libcURL CVE-2017-7468 Remote Security Bypass Vulnerability | BID | www.securityfocus.com | Third Party Advisory, VDB Entry |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.