7.5
CVSSv2

CVE-2015-3145

Published: 24/04/2015 Updated: 30/10/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

The sanitize_cookie_path function in cURL and libcurl 7.31.0 up to and including 7.41.0 does not properly calculate an index, which allows remote malicious users to cause a denial of service (out-of-bounds write and crash) or possibly have other unspecified impact via a cookie path containing only a double-quote character.

Vulnerable Product Search on Vulmon Subscribe to Product

fedoraproject fedora 21

fedoraproject fedora 22

canonical ubuntu linux 12.04

debian debian linux 7.0

canonical ubuntu linux 15.04

canonical ubuntu linux 14.10

canonical ubuntu linux 14.04

haxx curl 7.37.1

haxx curl 7.38.0

haxx curl 7.33.0

haxx curl 7.34.0

haxx curl 7.35.0

haxx curl 7.41.0

haxx curl 7.36.0

haxx curl 7.37.0

haxx curl 7.31.0

haxx curl 7.32.0

haxx curl 7.39.0

haxx curl 7.40.0

apple mac os x 10.10.2

apple mac os x 10.10.3

apple mac os x 10.10.0

apple mac os x 10.10.1

apple mac os x 10.10.4

oracle solaris 11.3

haxx libcurl 7.32.0

haxx libcurl 7.33.0

haxx libcurl 7.40.0

haxx libcurl 7.41.0

haxx libcurl 7.37.0

haxx libcurl 7.37.1

haxx libcurl 7.30.0

haxx libcurl 7.31.0

haxx libcurl 7.38.0

haxx libcurl 7.39

haxx libcurl 7.34.0

haxx libcurl 7.35.0

haxx libcurl 7.36.0

hp system management homepage

opensuse opensuse 13.1

opensuse opensuse 13.2

Vendor Advisories

Several security issues were fixed in curl ...
Several vulnerabilities were discovered in cURL, an URL transfer library: CVE-2015-3143 NTLM-authenticated connections could be wrongly reused for requests without any credentials set, leading to HTTP requests being sent over the connection authenticated as a different user This is similar to the issue fixed in DSA-2849-1 CVE-201 ...
It was discovered that libcurl could incorrectly reuse NTLM-authenticated connections for subsequent unauthenticated requests to the same host If an application using libcurl established an NTLM-authenticated connection to a server, and sent subsequent unauthenticed requests to the same server, the unauthenticated requests could be sent over the N ...
It was discovered that libcurl did not properly process cookies with a specially crafted "path" element If an application using libcurl connected to a malicious HTTP server sending specially crafted "Set-Cookies" headers, this could lead to an out-of-bounds read, and possibly cause that application to crash ...

Github Repositories

Демонстрация бага CVE-2015-3145 описание бага Основное описание описано здесь: CVE-2015-3145 Для демонстрации используется sanitize_cookie_path() из версии libcurl — 7340, можно скачать архивом отсюда Функция некорректно обрабат