Improper access control in libgit2 - CVE-2016-10130
Published: March 24, 2017 / Updated: July 28, 2020
Vulnerability identifier: #VU32002
CSH Severity: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2016-10130
CWE-ID: CWE-284
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vulnerable software:
libgit2
libgit2
Software vendor:
libgit2.github.com
libgit2.github.com
Description
The vulnerability allows a remote non-authenticated attacker to manipulate data.
The http_connect function in transports/http.c in libgit2 before 0.24.6 and 0.25.x before 0.25.1 might allow man-in-the-middle attackers to spoof servers by leveraging clobbering of the error variable.
Remediation
Install update from vendor's website.
External links
- http://lists.opensuse.org/opensuse-updates/2017-02/msg00030.html
- http://lists.opensuse.org/opensuse-updates/2017-02/msg00036.html
- http://lists.opensuse.org/opensuse-updates/2017-02/msg00072.html
- http://www.openwall.com/lists/oss-security/2017/01/10/5
- http://www.openwall.com/lists/oss-security/2017/01/11/6
- http://www.securityfocus.com/bid/95359
- https://github.com/libgit2/libgit2/commit/9a64e62f0f20c9cf9b2e1609f037060eb2d8eb22
- https://github.com/libgit2/libgit2/commit/b5c6a1b407b7f8b952bded2789593b68b1876211
- https://libgit2.github.com/security/