vulnerability
CentOS Linux: CVE-2020-8284: Moderate: curl security and bug fix update (CESA-2021:1610)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 4 | (AV:N/AC:M/Au:N/C:P/I:N/A:N) | Dec 14, 2020 | Jun 1, 2021 | May 25, 2023 |
Severity
4
CVSS
(AV:N/AC:M/Au:N/C:P/I:N/A:N)
Published
Dec 14, 2020
Added
Jun 1, 2021
Modified
May 25, 2023
Description
A malicious server can use the FTP PASV response to trick curl 7.73.0 and earlier into connecting back to a given IP address and port, and this way potentially make curl extract information about services that are otherwise private and not disclosed, for example doing port scanning and service banner extractions.
Solutions
centos-upgrade-curlcentos-upgrade-curl-debuginfocentos-upgrade-curl-debugsourcecentos-upgrade-curl-minimal-debuginfocentos-upgrade-libcurlcentos-upgrade-libcurl-debuginfocentos-upgrade-libcurl-develcentos-upgrade-libcurl-minimalcentos-upgrade-libcurl-minimal-debuginfo
References
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.