Rapid7 Vulnerability & Exploit Database

Ubuntu: USN-5412-1 (CVE-2022-27781): curl vulnerabilities

Back to Search

Ubuntu: USN-5412-1 (CVE-2022-27781): curl vulnerabilities

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
05/11/2022
Created
05/14/2022
Added
05/12/2022
Modified
06/15/2022

Description

Details for this vulnerability have not been published by NIST at this point. Descriptions from software vendor advisories for this issue are provided below.

From USN-5412-1:

Axel Chong discovered that curl incorrectly handled percent-encoded URL separators. A remote attacker could possibly use this issue to trick curl into using the wrong URL and bypass certain checks or filters. This issue only affected Ubuntu 22.04 LTS. (CVE-2022-27780)

Florian Kohnhuser discovered that curl incorrectly handled returning a TLS server's certificate chain details. A remote attacker could possibly use this issue to cause curl to stop responding, resulting in a denial of service. (CVE-2022-27781)

Harry Sintonen discovered that curl incorrectly reused a previous connection when certain options had been changed, contrary to expectations. (CVE-2022-27782)

Solution(s)

  • ubuntu-upgrade-curl
  • ubuntu-upgrade-libcurl3-gnutls
  • ubuntu-upgrade-libcurl3-nss
  • ubuntu-upgrade-libcurl4

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;