Rapid7 Vulnerability & Exploit Database

Red Hat: CVE-2021-22946: Requirement to use TLS not properly enforced for IMAP, POP3, and FTP protocols (Multiple Advisories)

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

Red Hat: CVE-2021-22946: Requirement to use TLS not properly enforced for IMAP, POP3, and FTP protocols (Multiple Advisories)

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:P/I:N/A:N)
Published
11/02/2021
Created
11/10/2021
Added
11/09/2021
Modified
12/15/2023

Description

A user can tell curl >= 7.20.0 and <= 7.78.0 to require a successful upgrade to TLS when speaking to an IMAP, POP3 or FTP server (`--ssl-reqd` on the command line or`CURLOPT_USE_SSL` set to `CURLUSESSL_CONTROL` or `CURLUSESSL_ALL` withlibcurl). This requirement could be bypassed if the server would return a properly crafted but perfectly legitimate response.This flaw would then make curl silently continue its operations **withoutTLS** contrary to the instructions and expectations, exposing possibly sensitive data in clear text over the network.

Solution(s)

  • redhat-upgrade-curl
  • redhat-upgrade-curl-debuginfo
  • redhat-upgrade-curl-debugsource
  • redhat-upgrade-curl-minimal-debuginfo
  • redhat-upgrade-libcurl
  • redhat-upgrade-libcurl-debuginfo
  • redhat-upgrade-libcurl-devel
  • redhat-upgrade-libcurl-minimal
  • redhat-upgrade-libcurl-minimal-debuginfo

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;