Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 2 |
CVE-ID | CVE-2014-3613 CVE-2014-3620 |
CWE-ID | CWE-310 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
Amazon Linux AMI Operating systems & Components / Operating system |
Vendor | Amazon Web Services |
Security Bulletin
This security bulletin contains information about 2 vulnerabilities.
EUVDB-ID: #VU41097
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2014-3613
CWE-ID:
CWE-310 - Cryptographic Issues
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to manipulate data.
cURL and libcurl before 7.38.0 does not properly handle IP addresses in cookie domain names, which allows remote attackers to set cookies for or send arbitrary cookies to certain sites, as demonstrated by a site at 192.168.0.1 setting cookies for a site at 127.168.0.1.
MitigationUpdate the affected packages:
i686:Vulnerable software versions
libcurl-7.38.0-1.46.amzn1.i686
libcurl-devel-7.38.0-1.46.amzn1.i686
curl-debuginfo-7.38.0-1.46.amzn1.i686
curl-7.38.0-1.46.amzn1.i686
src:
curl-7.38.0-1.46.amzn1.src
x86_64:
libcurl-devel-7.38.0-1.46.amzn1.x86_64
curl-debuginfo-7.38.0-1.46.amzn1.x86_64
libcurl-7.38.0-1.46.amzn1.x86_64
curl-7.38.0-1.46.amzn1.x86_64
Amazon Linux AMI: All versions
CPE2.3 External linkshttps://alas.aws.amazon.com/ALAS-2014-407.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU41096
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2014-3620
CWE-ID:
CWE-310 - Cryptographic Issues
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to manipulate data.
cURL and libcurl before 7.38.0 allow remote attackers to bypass the Same Origin Policy and set cookies for arbitrary sites by setting a cookie for a top-level domain.
MitigationUpdate the affected packages:
i686:Vulnerable software versions
libcurl-7.38.0-1.46.amzn1.i686
libcurl-devel-7.38.0-1.46.amzn1.i686
curl-debuginfo-7.38.0-1.46.amzn1.i686
curl-7.38.0-1.46.amzn1.i686
src:
curl-7.38.0-1.46.amzn1.src
x86_64:
libcurl-devel-7.38.0-1.46.amzn1.x86_64
curl-debuginfo-7.38.0-1.46.amzn1.x86_64
libcurl-7.38.0-1.46.amzn1.x86_64
curl-7.38.0-1.46.amzn1.x86_64
Amazon Linux AMI: All versions
CPE2.3 External linkshttps://alas.aws.amazon.com/ALAS-2014-407.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.