CVE-2015-3153
Debian Security Advisory 3240-1
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The default configuration for cURL and libcurl before 7.42.1 sends custom HTTP headers to both the proxy and destination server, which might allow remote proxy servers to obtain sensitive information by reading the header contents.
La configuración por defecto para cURL y libcurl anterior a 7.42.1 envía cabeceras HTTP personalizadas tanto al servidor proxy como al de destinación, lo que podría permitir a servidores proxy remotos obtener información sensible mediante la lectura de los contenidos de cabeceras.
Paras Sethia discovered that curl could incorrectly re-use NTLM HTTP credentials when subsequently connecting to the same host over HTTP. Hanno B=C3=B6ck discovered that curl incorrectly handled zero-length host names. If a user or automated system were tricked into using a specially crafted host name, an attacker could possibly use this issue to cause curl to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 14.10 and Ubuntu 15.04. Various other issues were also addressed.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2015-04-10 CVE Reserved
- 2015-04-30 CVE Published
- 2024-08-06 CVE Updated
- 2025-07-06 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
References (14)
URL | Tag | Source |
---|---|---|
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743 | X_refsource_confirm | |
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html | X_refsource_confirm |
|
http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html | X_refsource_confirm |
|
http://www.securityfocus.com/bid/74408 | Vdb Entry | |
http://www.securitytracker.com/id/1032233 | Third Party Advisory | |
https://kc.mcafee.com/corporate/index?page=content&id=SB10131 | X_refsource_confirm | |
https://support.apple.com/kb/HT205031 | Third Party Advisory |
|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html | 2018-10-17 | |
http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html | 2018-10-17 |
URL | Date | SRC |
---|---|---|
http://curl.haxx.se/docs/adv_20150429.html | 2018-10-17 | |
http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html | 2018-10-17 | |
http://lists.opensuse.org/opensuse-updates/2015-05/msg00017.html | 2018-10-17 | |
http://www.debian.org/security/2015/dsa-3240 | 2018-10-17 | |
http://www.ubuntu.com/usn/USN-2591-1 | 2018-10-17 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Oracle Search vendor "Oracle" | Enterprise Manager Ops Center Search vendor "Oracle" for product "Enterprise Manager Ops Center" | <= 12.1.3 Search vendor "Oracle" for product "Enterprise Manager Ops Center" and version " <= 12.1.3" | - |
Affected
| ||||||
Oracle Search vendor "Oracle" | Enterprise Manager Ops Center Search vendor "Oracle" for product "Enterprise Manager Ops Center" | 12.2.0 Search vendor "Oracle" for product "Enterprise Manager Ops Center" and version "12.2.0" | - |
Affected
| ||||||
Oracle Search vendor "Oracle" | Enterprise Manager Ops Center Search vendor "Oracle" for product "Enterprise Manager Ops Center" | 12.2.1 Search vendor "Oracle" for product "Enterprise Manager Ops Center" and version "12.2.1" | - |
Affected
| ||||||
Oracle Search vendor "Oracle" | Enterprise Manager Ops Center Search vendor "Oracle" for product "Enterprise Manager Ops Center" | 12.3.0 Search vendor "Oracle" for product "Enterprise Manager Ops Center" and version "12.3.0" | - |
Affected
| ||||||
Haxx Search vendor "Haxx" | Curl Search vendor "Haxx" for product "Curl" | <= 7.42.0 Search vendor "Haxx" for product "Curl" and version " <= 7.42.0" | - |
Affected
| ||||||
Haxx Search vendor "Haxx" | Libcurl Search vendor "Haxx" for product "Libcurl" | <= 7.42.0 Search vendor "Haxx" for product "Libcurl" and version " <= 7.42.0" | - |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 12.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "12.04" | lts |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 14.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "14.04" | lts |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 14.10 Search vendor "Canonical" for product "Ubuntu Linux" and version "14.10" | - |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 15.1 Search vendor "Canonical" for product "Ubuntu Linux" and version "15.1" | - |
Affected
| ||||||
Apple Search vendor "Apple" | Mac Os X Search vendor "Apple" for product "Mac Os X" | 10.10.4 Search vendor "Apple" for product "Mac Os X" and version "10.10.4" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 8.0 Search vendor "Debian" for product "Debian Linux" and version "8.0" | - |
Affected
|