#VU33014 Input validation error in cURL - CVE-2016-8625


| Updated: 2020-08-03

Vulnerability identifier: #VU33014

Vulnerability risk: Medium

CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2016-8625

CWE-ID: CWE-20

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
cURL
Client/Desktop applications / Other client software

Vendor: curl.haxx.se

Description

The vulnerability allows a remote non-authenticated attacker to manipulate data.

curl before version 7.51.0 uses outdated IDNA 2003 standard to handle International Domain Names and this may lead users to potentially and unknowingly issue network transfer requests to the wrong host.

Mitigation
Install update from vendor's website.

Vulnerable software versions

cURL: 7.1 - 7.50.3


External links
https://www.securityfocus.com/bid/94107
https://www.securitytracker.com/id/1037192
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:3558
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8625
https://curl.haxx.se/CVE-2016-8625.patch
https://curl.haxx.se/docs/adv_20161102K.html
https://security.gentoo.org/glsa/201701-47
https://www.tenable.com/security/tns-2016-21


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability