vulnerability

CentOS Linux: CVE-2020-8284: Moderate: curl security and bug fix update (CESA-2021:1610)

Severity
4
CVSS
(AV:N/AC:M/Au:N/C:P/I:N/A:N)
Published
Dec 14, 2020
Added
Jun 1, 2021
Modified
May 25, 2023

Description

A malicious server can use the FTP PASV response to trick curl 7.73.0 and earlier into connecting back to a given IP address and port, and this way potentially make curl extract information about services that are otherwise private and not disclosed, for example doing port scanning and service banner extractions.

Solutions

centos-upgrade-curlcentos-upgrade-curl-debuginfocentos-upgrade-curl-debugsourcecentos-upgrade-curl-minimal-debuginfocentos-upgrade-libcurlcentos-upgrade-libcurl-debuginfocentos-upgrade-libcurl-develcentos-upgrade-libcurl-minimalcentos-upgrade-libcurl-minimal-debuginfo
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.