← Back to CVEs
CVE-2016-5420
N/ADescription
curl and libcurl before 7.50.1 do not check the client certificate when choosing the TLS connection to reuse, which might allow remote attackers to hijack the authentication of the connection by leveraging a previously created connection with a different client certificate.
CVE Details
CVSS v3.1 ScoreN/A
Published8/10/2016
Last Modified4/12/2025
Sourcenvd
Honeypot Sightings0
Affected Products
debian:debian_linuxhaxx:libcurlopensuse:leap
Weaknesses (CWE)
CWE-285
References
http://lists.opensuse.org/opensuse-updates/2016-09/msg00011.html(secalert@redhat.com)
http://lists.opensuse.org/opensuse-updates/2016-09/msg00094.html(secalert@redhat.com)
http://rhn.redhat.com/errata/RHSA-2016-2575.html(secalert@redhat.com)
http://rhn.redhat.com/errata/RHSA-2016-2957.html(secalert@redhat.com)
http://www.debian.org/security/2016/dsa-3638(secalert@redhat.com)
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html(secalert@redhat.com)
http://www.securityfocus.com/bid/92309(secalert@redhat.com)
http://www.securitytracker.com/id/1036537(secalert@redhat.com)
http://www.securitytracker.com/id/1036739(secalert@redhat.com)
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.563059(secalert@redhat.com)
http://www.ubuntu.com/usn/USN-3048-1(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2018:3558(secalert@redhat.com)
https://curl.haxx.se/docs/adv_20160803B.html(secalert@redhat.com)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GLPXQQKURBQFM4XM6645VRPTOE2AWG33/(secalert@redhat.com)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K3GQH4V3XAQ5Z53AMQRDEC3C3UHTW7QR/(secalert@redhat.com)
https://security.gentoo.org/glsa/201701-47(secalert@redhat.com)
https://source.android.com/security/bulletin/2016-12-01.html(secalert@redhat.com)
https://www.tenable.com/security/tns-2016-18(secalert@redhat.com)
http://lists.opensuse.org/opensuse-updates/2016-09/msg00011.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-updates/2016-09/msg00094.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2016-2575.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2016-2957.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2016/dsa-3638(af854a3a-2127-422b-91ae-364da2661108)
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/92309(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1036537(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1036739(af854a3a-2127-422b-91ae-364da2661108)
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.563059(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/USN-3048-1(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:3558(af854a3a-2127-422b-91ae-364da2661108)
https://curl.haxx.se/docs/adv_20160803B.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GLPXQQKURBQFM4XM6645VRPTOE2AWG33/(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K3GQH4V3XAQ5Z53AMQRDEC3C3UHTW7QR/(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/201701-47(af854a3a-2127-422b-91ae-364da2661108)
https://source.android.com/security/bulletin/2016-12-01.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.tenable.com/security/tns-2016-18(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.