It was discovered that libcurl could incorrectly reuse NTLM-authenticated connections for subsequent unauthenticated requests to the same host. If an application using libcurl established an NTLM-authenticated connection to a server, and sent subsequent unauthenticated requests to the same server, the unauthenticated requests could be sent over the NTLM-authenticated connection, appearing as if they were sent by the NTLM authenticated user.
Find out more about CVE-2015-3143 from the MITRE CVE dictionary dictionary and NIST NVD.
This issue affects the version of curl package as shipped with Red Hat Enterprise Linux 5. Red Hat Enterprise Linux 5 is now in Production 3 Phase of the support and maintenance life cycle. This issue is not planned to be addressed in a future update for Red Hat Enterprise Linux 5.
Base Score | 4 |
---|---|
Base Metrics | AV:N/AC:H/Au:N/C:P/I:P/A:N |
Access Vector | Network |
Access Complexity | High |
Authentication | None |
Confidentiality Impact | Partial |
Integrity Impact | Partial |
Availability Impact | None |
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Platform | Errata | Release Date |
---|---|---|
Red Hat Enterprise Linux 7 (curl) | RHSA-2015:2159 | 2015-11-19 |
Red Hat Enterprise Linux 6 (curl) | RHSA-2015:1254 | 2015-07-20 |
Platform | Package | State |
---|---|---|
Red Hat Enterprise Linux 5 | curl | Will not fix |
Red Hat Ceph Storage 1.2 | curl | Will not fix |
RHEV Manager 3 | mingw-virt-viewer | Fix deferred |