ID CVE-2011-2192
Summary The Curl_input_negotiate function in http_negotiate.c in libcurl 7.10.6 through 7.21.6, as used in curl and other products, always performs credential delegation during GSSAPI authentication, which allows remote servers to impersonate clients via GSSAPI requests.
References
Vulnerable Configurations
  • cpe:2.3:a:curl:curl
    cpe:2.3:a:curl:curl
  • cpe:2.3:a:curl:libcurl:7.10.6
    cpe:2.3:a:curl:libcurl:7.10.6
  • cpe:2.3:a:curl:libcurl:7.10.7
    cpe:2.3:a:curl:libcurl:7.10.7
  • cpe:2.3:a:curl:libcurl:7.10.8
    cpe:2.3:a:curl:libcurl:7.10.8
  • cpe:2.3:a:curl:libcurl:7.11.0
    cpe:2.3:a:curl:libcurl:7.11.0
  • cpe:2.3:a:curl:libcurl:7.11.1
    cpe:2.3:a:curl:libcurl:7.11.1
  • cpe:2.3:a:curl:libcurl:7.11.2
    cpe:2.3:a:curl:libcurl:7.11.2
  • cpe:2.3:a:curl:libcurl:7.12
    cpe:2.3:a:curl:libcurl:7.12
  • cpe:2.3:a:curl:libcurl:7.12.0
    cpe:2.3:a:curl:libcurl:7.12.0
  • cpe:2.3:a:curl:libcurl:7.12.1
    cpe:2.3:a:curl:libcurl:7.12.1
  • cpe:2.3:a:curl:libcurl:7.12.2
    cpe:2.3:a:curl:libcurl:7.12.2
  • cpe:2.3:a:curl:libcurl:7.12.3
    cpe:2.3:a:curl:libcurl:7.12.3
  • cpe:2.3:a:curl:libcurl:7.13
    cpe:2.3:a:curl:libcurl:7.13
  • cpe:2.3:a:curl:libcurl:7.13.1
    cpe:2.3:a:curl:libcurl:7.13.1
  • cpe:2.3:a:curl:libcurl:7.13.2
    cpe:2.3:a:curl:libcurl:7.13.2
  • cpe:2.3:a:curl:libcurl:7.14
    cpe:2.3:a:curl:libcurl:7.14
  • cpe:2.3:a:curl:libcurl:7.14.1
    cpe:2.3:a:curl:libcurl:7.14.1
  • cpe:2.3:a:curl:libcurl:7.15
    cpe:2.3:a:curl:libcurl:7.15
  • cpe:2.3:a:curl:libcurl:7.15.1
    cpe:2.3:a:curl:libcurl:7.15.1
  • cpe:2.3:a:curl:libcurl:7.15.2
    cpe:2.3:a:curl:libcurl:7.15.2
  • cpe:2.3:a:curl:libcurl:7.15.3
    cpe:2.3:a:curl:libcurl:7.15.3
  • cpe:2.3:a:curl:libcurl:7.16.3
    cpe:2.3:a:curl:libcurl:7.16.3
  • cpe:2.3:a:curl:libcurl:7.17.0
    cpe:2.3:a:curl:libcurl:7.17.0
  • cpe:2.3:a:curl:libcurl:7.17.1
    cpe:2.3:a:curl:libcurl:7.17.1
  • cpe:2.3:a:curl:libcurl:7.18.0
    cpe:2.3:a:curl:libcurl:7.18.0
  • cpe:2.3:a:curl:libcurl:7.18.1
    cpe:2.3:a:curl:libcurl:7.18.1
  • cpe:2.3:a:curl:libcurl:7.18.2
    cpe:2.3:a:curl:libcurl:7.18.2
  • cpe:2.3:a:curl:libcurl:7.19.0
    cpe:2.3:a:curl:libcurl:7.19.0
  • cpe:2.3:a:curl:libcurl:7.19.1
    cpe:2.3:a:curl:libcurl:7.19.1
  • cpe:2.3:a:curl:libcurl:7.19.2
    cpe:2.3:a:curl:libcurl:7.19.2
  • cpe:2.3:a:curl:libcurl:7.19.3
    cpe:2.3:a:curl:libcurl:7.19.3
  • cpe:2.3:a:curl:libcurl:7.19.4
    cpe:2.3:a:curl:libcurl:7.19.4
  • cpe:2.3:a:curl:libcurl:7.19.5
    cpe:2.3:a:curl:libcurl:7.19.5
  • cpe:2.3:a:curl:libcurl:7.19.6
    cpe:2.3:a:curl:libcurl:7.19.6
  • cpe:2.3:a:curl:libcurl:7.19.7
    cpe:2.3:a:curl:libcurl:7.19.7
  • cpe:2.3:a:curl:libcurl:7.20.0
    cpe:2.3:a:curl:libcurl:7.20.0
  • cpe:2.3:a:curl:libcurl:7.20.1
    cpe:2.3:a:curl:libcurl:7.20.1
  • cpe:2.3:a:curl:libcurl:7.21.1
    cpe:2.3:a:curl:libcurl:7.21.1
  • cpe:2.3:a:curl:libcurl:7.21.2
    cpe:2.3:a:curl:libcurl:7.21.2
  • cpe:2.3:a:curl:libcurl:7.21.3
    cpe:2.3:a:curl:libcurl:7.21.3
  • cpe:2.3:a:curl:libcurl:7.21.4
    cpe:2.3:a:curl:libcurl:7.21.4
  • cpe:2.3:a:curl:libcurl:7.21.5
    cpe:2.3:a:curl:libcurl:7.21.5
  • cpe:2.3:a:curl:libcurl:7.21.6
    cpe:2.3:a:curl:libcurl:7.21.6
CVSS
Base: 4.3 (as of 08-07-2011 - 11:49)
Impact:
Exploitability:
CWE CWE-255
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL NONE NONE
nessus via4
  • NASL family Mandriva Local Security Checks
    NASL id MANDRIVA_MDVSA-2011-116.NASL
    description A vulnerability was discovered and corrected in curl : The Curl_input_negotiate function in http_negotiate.c in libcurl 7.10.6 through 7.21.6, as used in curl and other products, always performs credential delegation during GSSAPI authentication, which allows remote servers to impersonate clients via GSSAPI requests (CVE-2011-2192). Packages for 2009.0 are provided as of the Extended Maintenance Program. Please visit this link to learn more: http://store.mandriva.com/product_info.php?cPath=149 products_id=490 The updated packages have been patched to correct this issue.
    last seen 2019-02-21
    modified 2019-01-02
    plugin id 55664
    published 2011-07-25
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=55664
    title Mandriva Linux Security Advisory : curl (MDVSA-2011:116)
  • NASL family MacOS X Local Security Checks
    NASL id MACOSX_SECUPD2012-001.NASL
    description The remote host is running a version of Mac OS X 10.6 that does not have Security Update 2012-001 applied. This update contains multiple security-related fixes for the following components : - Apache - ATS - ColorSync - CoreAudio - CoreMedia - CoreText - curl - Data Security - dovecot - filecmds - libresolv - libsecurity - OpenGL - PHP - QuickTime - SquirrelMail - Subversion - Tomcat - X11
    last seen 2019-02-21
    modified 2018-07-14
    plugin id 57798
    published 2012-02-02
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=57798
    title Mac OS X Multiple Vulnerabilities (Security Update 2012-001) (BEAST)
  • NASL family MacOS X Local Security Checks
    NASL id MACOSX_10_7_3.NASL
    description The remote host is running a version of Mac OS X 10.7.x that is prior to 10.7.3. The newer version contains multiple security-related fixes for the following components : - Address Book - Apache - ATS - CFNetwork - CoreMedia - CoreText - CoreUI - curl - Data Security - dovecot - filecmds - ImageIO - Internet Sharing - Libinfo - libresolv - libsecurity - OpenGL - PHP - QuickTime - Subversion - Time Machine - WebDAV Sharing - Webmail - X11
    last seen 2019-02-21
    modified 2018-07-14
    plugin id 57797
    published 2012-02-02
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=57797
    title Mac OS X 10.7.x < 10.7.3 Multiple Vulnerabilities (BEAST)
  • NASL family Gentoo Local Security Checks
    NASL id GENTOO_GLSA-201203-02.NASL
    description The remote host is affected by the vulnerability described in GLSA-201203-02 (cURL: Multiple vulnerabilities) Multiple vulnerabilities have been found in cURL: When zlib is enabled, the amount of data sent to an application for automatic decompression is not restricted (CVE-2010-0734). When performing GSSAPI authentication, credential delegation is always used (CVE-2011-2192). When SSL is enabled, cURL improperly disables the OpenSSL workaround to mitigate an information disclosure vulnerability in the SSL and TLS protocols (CVE-2011-3389). libcurl does not properly verify file paths for escape control characters in IMAP, POP3 or SMTP URLs (CVE-2012-0036). Impact : A remote attacker could entice a user or automated process to open a specially crafted file or URL using cURL, possibly resulting in the remote execution of arbitrary code, a Denial of Service condition, disclosure of sensitive information, or unwanted actions performed via the IMAP, POP3 or SMTP protocols. Furthermore, remote servers may be able to impersonate clients via GSSAPI requests. Workaround : There is no known workaround at this time.
    last seen 2019-02-21
    modified 2018-07-11
    plugin id 58212
    published 2012-03-06
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=58212
    title GLSA-201203-02 : cURL: Multiple vulnerabilities (BEAST)
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DSA-2271.NASL
    description Richard Silverman discovered that when doing GSSAPI authentication, libcurl unconditionally performs credential delegation. This hands the server a copy of the client's security credentials, allowing the server to impersonate the client to any other using the same GSSAPI mechanism. This is obviously a very sensitive operation, which should only be done when the user explicitly so directs.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 55491
    published 2011-07-05
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=55491
    title Debian DSA-2271-1 : curl - improper delegation of client credentials
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-1158-1.NASL
    description Richard Silverman discovered that when doing GSSAPI authentication, libcurl unconditionally performs credential delegation, handing the server a copy of the client's security credential. (CVE-2011-2192) Wesley Miaw discovered that when zlib is enabled, libcurl does not properly restrict the amount of callback data sent to an application that requests automatic decompression. This might allow an attacker to cause a denial of service via an application crash or possibly execute arbitrary code with the privilege of the application. This issue only affected Ubuntu 8.04 LTS and Ubuntu 10.04 LTS. (CVE-2010-0734) USN 818-1 fixed an issue with curl's handling of SSL certificates with zero bytes in the Common Name. Due to a packaging error, the fix for this issue was not being applied during the build. This issue only affected Ubuntu 8.04 LTS. We apologize for the error. (CVE-2009-2417) Scott Cantor discovered that curl did not correctly handle SSL certificates with zero bytes in the Common Name. A remote attacker could exploit this to perform a man in the middle attack to view sensitive information or alter encrypted communications. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-12-01
    plugin id 55414
    published 2011-06-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=55414
    title Ubuntu 8.04 LTS / 10.04 LTS / 10.10 / 11.04 : curl vulnerabilities (USN-1158-1)
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2011-0918.NASL
    description From Red Hat Security Advisory 2011:0918 : Updated curl packages that fix one security issue are now available for Red Hat Enterprise Linux 4, 5, and 6. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. cURL provides the libcurl library and a command line tool for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. It was found that cURL always performed credential delegation when authenticating with GSSAPI. A rogue server could use this flaw to obtain the client's credentials and impersonate that client to other servers that are using GSSAPI. (CVE-2011-2192) Users of curl should upgrade to these updated packages, which contain a backported patch to correct this issue. All running applications using libcurl must be restarted for the update to take effect.
    last seen 2019-02-21
    modified 2019-01-02
    plugin id 68300
    published 2013-07-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=68300
    title Oracle Linux 4 / 5 / 6 : curl (ELSA-2011-0918)
  • NASL family FreeBSD Local Security Checks
    NASL id FREEBSD_PKG_9AECB94CC1AD11E3A5AC001B21614864.NASL
    description cURL reports : When doing GSSAPI authentication, libcurl unconditionally performs credential delegation. This hands the server a copy of the client's security credentials, allowing the server to impersonate the client to any other using the same GSSAPI mechanism.
    last seen 2019-02-21
    modified 2018-12-19
    plugin id 73551
    published 2014-04-16
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=73551
    title FreeBSD : cURL -- inappropriate GSSAPI delegation (9aecb94c-c1ad-11e3-a5ac-001b21614864)
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20110705_CURL_ON_SL4_X.NASL
    description cURL provides the libcurl library and a command line tool for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. It was found that cURL always performed credential delegation when authenticating with GSSAPI. A rogue server could use this flaw to obtain the client's credentials and impersonate that client to other servers that are using GSSAPI. (CVE-2011-2192) All running applications using libcurl must be restarted for the update to take effect.
    last seen 2019-02-21
    modified 2018-12-31
    plugin id 61078
    published 2012-08-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=61078
    title Scientific Linux Security Update : curl on SL4.x, SL5.x, SL6.x i386/x86_64
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2011-0918.NASL
    description Updated curl packages that fix one security issue are now available for Red Hat Enterprise Linux 4, 5, and 6. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. cURL provides the libcurl library and a command line tool for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. It was found that cURL always performed credential delegation when authenticating with GSSAPI. A rogue server could use this flaw to obtain the client's credentials and impersonate that client to other servers that are using GSSAPI. (CVE-2011-2192) Users of curl should upgrade to these updated packages, which contain a backported patch to correct this issue. All running applications using libcurl must be restarted for the update to take effect.
    last seen 2019-02-21
    modified 2018-11-28
    plugin id 55515
    published 2011-07-06
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=55515
    title CentOS 4 / 5 : curl (CESA-2011:0918)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2011-8586.NASL
    description do not delegate GSSAPI credentials (CVE-2011-2192) Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2015-10-20
    plugin id 55426
    published 2011-06-27
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=55426
    title Fedora 15 : curl-7.21.3-8.fc15 (2011-8586)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2011-0918.NASL
    description Updated curl packages that fix one security issue are now available for Red Hat Enterprise Linux 4, 5, and 6. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. cURL provides the libcurl library and a command line tool for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. It was found that cURL always performed credential delegation when authenticating with GSSAPI. A rogue server could use this flaw to obtain the client's credentials and impersonate that client to other servers that are using GSSAPI. (CVE-2011-2192) Users of curl should upgrade to these updated packages, which contain a backported patch to correct this issue. All running applications using libcurl must be restarted for the update to take effect.
    last seen 2019-02-21
    modified 2019-01-02
    plugin id 55519
    published 2011-07-06
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=55519
    title RHEL 4 / 5 / 6 : curl (RHSA-2011:0918)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_4_CURL-120131.NASL
    description This update of curl disables GSSAPI to workaround CVE-2011-2192 (bnc#698796).
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 75807
    published 2014-06-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=75807
    title openSUSE Security Update : curl (openSUSE-SU-2012:0199-1)
  • NASL family OracleVM Local Security Checks
    NASL id ORACLEVM_OVMSA-2016-0056.NASL
    description The remote OracleVM system is missing necessary patches to address critical security updates : - fix heap-based buffer overflow in curl_easy_unescape (CVE-2013-2174) - fix cookie tailmatching to prevent cross-domain leakage (CVE-2013-1944) - introduce the --delegation option of curl (#746849) - fix stack smashing in the FTP implementation (#652557) - fix proxy kerberos authentication (#657396) - update running_handles counter properly in curl_multi_remove_handle (#688871) - add a new option CURLOPT_GSSAPI_DELEGATION (#723643) - do not delegate GSSAPI credentials (CVE-2011-2192) - avoid use of uninitialized variable on failure of a LDAP request (#655073) - proxy tunnel support for LDAP requests (#655073)
    last seen 2019-02-21
    modified 2018-07-24
    plugin id 91740
    published 2016-06-22
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=91740
    title OracleVM 3.2 : curl (OVMSA-2016-0056)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2011-8640.NASL
    description do not delegate GSSAPI credentials (CVE-2011-2192) Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-07-12
    plugin id 55497
    published 2011-07-05
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=55497
    title Fedora 14 : curl-7.21.0-8.fc14 (2011-8640)
  • NASL family Web Servers
    NASL id HPSMH_7_0_0_24.NASL
    description According to the web server's banner, the version of HP System Management Homepage (SMH) hosted on the remote host is earlier than 7.0. As such, it is reportedly affected by the following vulnerabilities : - An error exists in the 'generate-id' function in the bundled libxslt library that can allow disclosure of heap memory addresses. (CVE-2011-0195) - An unspecified input validation error exists and can allow cross-site request forgery attacks. (CVE-2011-3846) - Unspecified errors can allow attackers to carry out denial of service attacks via unspecified vectors. (CVE-2012-0135, CVE-2012-1993) - The bundled version of PHP contains multiple vulnerabilities. (CVE-2010-3436, CVE-2010-4409, CVE-2010-4645, CVE-2011-1148, CVE-2011-1153, CVE-2011-1464, CVE-2011-1467, CVE-2011-1468, CVE-2011-1470, CVE-2011-1471, CVE-2011-1938, CVE-2011-2202, CVE-2011-2483, CVE-2011-3182, CVE-2011-3189, CVE-2011-3267, CVE-2011-3268) - The bundled version of Apache contains multiple vulnerabilities. (CVE-2010-1452, CVE-2010-1623, CVE-2010-2068, CVE-2010-2791, CVE-2011-0419, CVE-2011-1928, CVE-2011-3192, CVE-2011-3348, CVE-2011-3368, CVE-2011-3639) - OpenSSL libraries are contained in several of the bundled components and contain multiple vulnerabilities. (CVE-2011-0014, CVE-2011-1468, CVE-2011-1945, CVE-2011-3207,CVE-2011-3210) - Curl libraries are contained in several of the bundled components and contain multiple vulnerabilities. (CVE-2009-0037, CVE-2010-0734, CVE-2011-2192)
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 58811
    published 2012-04-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=58811
    title HP System Management Homepage < 7.0 Multiple Vulnerabilities
  • NASL family VMware ESX Local Security Checks
    NASL id VMWARE_VMSA-2012-0001.NASL
    description a. ESX third-party update for Service Console kernel The ESX Service Console Operating System (COS) kernel is updated to kernel-2.6.18-274.3.1.el5 to fix multiple security issues in the COS kernel. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2011-0726, CVE-2011-1078, CVE-2011-1079, CVE-2011-1080, CVE-2011-1093, CVE-2011-1163, CVE-2011-1166, CVE-2011-1170, CVE-2011-1171, CVE-2011-1172, CVE-2011-1494, CVE-2011-1495, CVE-2011-1577, CVE-2011-1763, CVE-2010-4649, CVE-2011-0695, CVE-2011-0711, CVE-2011-1044, CVE-2011-1182, CVE-2011-1573, CVE-2011-1576, CVE-2011-1593, CVE-2011-1745, CVE-2011-1746, CVE-2011-1776, CVE-2011-1936, CVE-2011-2022, CVE-2011-2213, CVE-2011-2492, CVE-2011-1780, CVE-2011-2525, CVE-2011-2689, CVE-2011-2482, CVE-2011-2491, CVE-2011-2495, CVE-2011-2517, CVE-2011-2519, CVE-2011-2901 to these issues. b. ESX third-party update for Service Console cURL RPM The ESX Service Console (COS) curl RPM is updated to cURL-7.15.5.9 resolving a security issues. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2011-2192 to this issue. c. ESX third-party update for Service Console nspr and nss RPMs The ESX Service Console (COS) nspr and nss RPMs are updated to nspr-4.8.8-1.el5_7 and nss-3.12.10-4.el5_7 respectively resolving a security issues. A Certificate Authority (CA) issued fraudulent SSL certificates and Netscape Portable Runtime (NSPR) and Network Security Services (NSS) contain the built-in tokens of this fraudulent Certificate Authority. This update renders all SSL certificates signed by the fraudulent CA as untrusted for all uses. d. ESX third-party update for Service Console rpm RPMs The ESX Service Console Operating System (COS) rpm packages are updated to popt-1.10.2.3-22.el5_7.2, rpm-4.4.2.3-22.el5_7.2, rpm-libs-4.4.2.3-22.el5_7.2 and rpm-python-4.4.2.3-22.el5_7.2 which fixes multiple security issues. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2010-2059 and CVE-2011-3378 to these issues. e. ESX third-party update for Service Console samba RPMs The ESX Service Console Operating System (COS) samba packages are updated to samba-client-3.0.33-3.29.el5_7.4, samba-common-3.0.33-3.29.el5_7.4 and libsmbclient-3.0.33-3.29.el5_7.4 which fixes multiple security issues in the Samba client. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2010-0547, CVE-2010-0787, CVE-2011-1678, CVE-2011-2522 and CVE-2011-2694 to these issues. Note that ESX does not include the Samba Web Administration Tool (SWAT) and therefore ESX COS is not affected by CVE-2011-2522 and CVE-2011-2694. f. ESX third-party update for Service Console python package The ESX Service Console (COS) python package is updated to 2.4.3-44 which fixes multiple security issues. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2009-3720, CVE-2010-3493, CVE-2011-1015 and CVE-2011-1521 to these issues. g. ESXi update to third-party component python The python third-party library is updated to python 2.5.6 which fixes multiple security issues. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2009-3560, CVE-2009-3720, CVE-2010-1634, CVE-2010-2089, and CVE-2011-1521 to these issues.
    last seen 2019-02-21
    modified 2018-09-06
    plugin id 57749
    published 2012-01-31
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=57749
    title VMSA-2012-0001 : VMware ESXi and ESX updates to third-party library and ESX Service Console
  • NASL family Misc.
    NASL id VMWARE_VMSA-2012-0001_REMOTE.NASL
    description The remote VMware ESX / ESXi host is missing a security-related patch. It is, therefore, affected by multiple vulnerabilities, including remote code execution vulnerabilities, in several third-party libraries : - COS kernel - cURL - python - rpm
    last seen 2019-02-21
    modified 2018-08-16
    plugin id 89105
    published 2016-03-03
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=89105
    title VMware ESX / ESXi Service Console and Third-Party Libraries Multiple Vulnerabilities (VMSA-2012-0001) (remote check)
redhat via4
advisories
bugzilla
id 711454
title CVE-2011-2192 curl: Improper delegation of client credentials during GSS negotiation
oval
OR
  • AND
    • comment Red Hat Enterprise Linux 4 is installed
      oval oval:com.redhat.rhba:tst:20070304001
    • OR
      • AND
        • comment curl is earlier than 0:7.12.1-17.el4
          oval oval:com.redhat.rhsa:tst:20110918002
        • comment curl is signed with Red Hat master key
          oval oval:com.redhat.rhsa:tst:20090341003
      • AND
        • comment curl-devel is earlier than 0:7.12.1-17.el4
          oval oval:com.redhat.rhsa:tst:20110918004
        • comment curl-devel is signed with Red Hat master key
          oval oval:com.redhat.rhsa:tst:20090341005
  • AND
    • comment Red Hat Enterprise Linux 5 is installed
      oval oval:com.redhat.rhba:tst:20070331001
    • OR
      • AND
        • comment curl is earlier than 0:7.15.5-9.el5_6.3
          oval oval:com.redhat.rhsa:tst:20110918007
        • comment curl is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20090341011
      • AND
        • comment curl-devel is earlier than 0:7.15.5-9.el5_6.3
          oval oval:com.redhat.rhsa:tst:20110918009
        • comment curl-devel is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20090341013
  • AND
    • OR
      • comment Red Hat Enterprise Linux 6 Client is installed
        oval oval:com.redhat.rhba:tst:20111656001
      • comment Red Hat Enterprise Linux 6 Server is installed
        oval oval:com.redhat.rhba:tst:20111656002
      • comment Red Hat Enterprise Linux 6 Workstation is installed
        oval oval:com.redhat.rhba:tst:20111656003
      • comment Red Hat Enterprise Linux 6 ComputeNode is installed
        oval oval:com.redhat.rhba:tst:20111656004
    • OR
      • AND
        • comment curl is earlier than 0:7.19.7-26.el6_1.1
          oval oval:com.redhat.rhsa:tst:20110918015
        • comment curl is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20110918016
      • AND
        • comment libcurl is earlier than 0:7.19.7-26.el6_1.1
          oval oval:com.redhat.rhsa:tst:20110918019
        • comment libcurl is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20110918020
      • AND
        • comment libcurl-devel is earlier than 0:7.19.7-26.el6_1.1
          oval oval:com.redhat.rhsa:tst:20110918017
        • comment libcurl-devel is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20110918018
rhsa
id RHSA-2011:0918
released 2011-07-05
severity Moderate
title RHSA-2011:0918: curl security update (Moderate)
rpms
  • curl-0:7.12.1-17.el4
  • curl-devel-0:7.12.1-17.el4
  • curl-0:7.15.5-9.el5_6.3
  • curl-devel-0:7.15.5-9.el5_6.3
  • curl-0:7.19.7-26.el6_1.1
  • libcurl-0:7.19.7-26.el6_1.1
  • libcurl-devel-0:7.19.7-26.el6_1.1
refmap via4
apple APPLE-SA-2012-02-01-1
confirm
debian DSA-2271
fedora
  • FEDORA-2011-8586
  • FEDORA-2011-8640
gentoo GLSA-201203-02
mandriva MDVSA-2011:116
sectrack 1025713
secunia
  • 45047
  • 45067
  • 45088
  • 45144
  • 45181
  • 48256
ubuntu USN-1158-1
vmware via4
description The ESX Service Console (COS) curl RPM is updated to cURL-7.15.5.9 resolving a security issue
id VMSA-2012-0001
last_updated 2012-03-29T00:00:00
published 2012-01-30T00:00:00
title ESX third party update for Service Console cURL RPM
Last major update 03-02-2012 - 22:59
Published 07-07-2011 - 17:55
Last modified 04-01-2018 - 21:29
Back to Top