HIGH · 7.5

CVE-2016-5419

curl and libcurl before 7.50.1 do not prevent TLS session resumption when the client certificate has changed, which allows remote attackers to bypass intended restrictions by resuming a session.

Vulnerability Description

curl and libcurl before 7.50.1 do not prevent TLS session resumption when the client certificate has changed, which allows remote attackers to bypass intended restrictions by resuming a session.

CVSS Score

7.5

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
NONE
Availability
NONE

Affected Products

VendorProductVersions
HaxxLibcurl<= 7.50.0
DebianDebian Linux8.0
OpensuseLeap42.1

Related Weaknesses (CWE)

References

FAQ

What is CVE-2016-5419?

CVE-2016-5419 is a vulnerability with a CVSS score of 7.5 (HIGH). curl and libcurl before 7.50.1 do not prevent TLS session resumption when the client certificate has changed, which allows remote attackers to bypass intended restrictions by resuming a session.

How severe is CVE-2016-5419?

CVE-2016-5419 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2016-5419?

Check the references section above for vendor advisories and patch information. Affected products include: Haxx Libcurl, Debian Debian Linux, Opensuse Leap.