Vulnerabilidad en libcurl (CVE-2014-8150)
Gravedad CVSS v2.0:
MEDIA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
15/01/2015
Última modificación:
12/04/2025
Descripción
Vulnerabilidad de inyección CRLF en libcurl 6.0 hasta 7.x anterior a 7.40.0, cuando utiliza un proxy HTTP, permite a atacantes remotos inyectar cabeceras HTTP arbitrarias y realizar ataques de división de respuestas HTTP a través de secuencias de CRLF en una URL.
Impacto
Puntuación base 2.0
4.30
Gravedad 2.0
MEDIA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:haxx:libcurl:6.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:haxx:libcurl:6.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:haxx:libcurl:6.1:beta:*:*:*:*:*:* | ||
| cpe:2.3:a:haxx:libcurl:6.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:haxx:libcurl:6.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:haxx:libcurl:6.3.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:haxx:libcurl:6.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:haxx:libcurl:6.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:haxx:libcurl:6.5.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:haxx:libcurl:6.5.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:haxx:libcurl:7.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:haxx:libcurl:7.1.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:haxx:libcurl:7.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:haxx:libcurl:7.2.1:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://advisories.mageia.org/MGASA-2015-0020.html
- http://curl.haxx.se/docs/adv_20150108B.html
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743
- http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147856.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147876.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156945.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157188.html
- http://lists.opensuse.org/opensuse-updates/2015-02/msg00040.html
- http://rhn.redhat.com/errata/RHSA-2015-1254.html
- http://secunia.com/advisories/61925
- http://secunia.com/advisories/62075
- http://secunia.com/advisories/62361
- http://www.debian.org/security/2015/dsa-3122
- http://www.mandriva.com/security/advisories?name=MDVSA-2015%3A021
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/71964
- http://www.securitytracker.com/id/1032768
- http://www.ubuntu.com/usn/USN-2474-1
- https://kc.mcafee.com/corporate/index?page=content&id=SB10131
- https://security.gentoo.org/glsa/201701-47
- https://support.apple.com/kb/HT205031
- http://advisories.mageia.org/MGASA-2015-0020.html
- http://curl.haxx.se/docs/adv_20150108B.html
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743
- http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147856.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147876.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156945.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157188.html
- http://lists.opensuse.org/opensuse-updates/2015-02/msg00040.html
- http://rhn.redhat.com/errata/RHSA-2015-1254.html
- http://secunia.com/advisories/61925
- http://secunia.com/advisories/62075
- http://secunia.com/advisories/62361
- http://www.debian.org/security/2015/dsa-3122
- http://www.mandriva.com/security/advisories?name=MDVSA-2015%3A021
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/71964
- http://www.securitytracker.com/id/1032768
- http://www.ubuntu.com/usn/USN-2474-1
- https://kc.mcafee.com/corporate/index?page=content&id=SB10131
- https://security.gentoo.org/glsa/201701-47
- https://support.apple.com/kb/HT205031



