Rocky Linux 8 : curl (RLSA-2023:4523)

medium Nessus Plugin ID 182729

Synopsis

The remote Rocky Linux host is missing one or more security updates.

Description

The remote Rocky Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the RLSA-2023:4523 advisory.

- An authentication bypass vulnerability exists libcurl <8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed. (CVE-2023-27536)

- An improper certificate validation vulnerability exists in curl <v8.1.0 in the way it supports matching of wildcard patterns when listed as Subject Alternative Name in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`. (CVE-2023-28321)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://errata.rockylinux.org/RLSA-2023:4523

https://bugzilla.redhat.com/show_bug.cgi?id=2179092

https://bugzilla.redhat.com/show_bug.cgi?id=2196786

Plugin Details

Severity: Medium

ID: 182729

File Name: rocky_linux_RLSA-2023-4523.nasl

Version: 1.1

Type: local

Published: 10/6/2023

Updated: 11/6/2023

Supported Sensors: Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Medium

Base Score: 5.4

Temporal Score: 4.2

Vector: CVSS2#AV:N/AC:H/Au:N/C:N/I:C/A:N

CVSS Score Source: CVE-2023-28321

CVSS v3

Risk Factor: Medium

Base Score: 5.9

Temporal Score: 5.3

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:rocky:linux:libcurl-devel, p-cpe:/a:rocky:linux:libcurl, cpe:/o:rocky:linux:8, p-cpe:/a:rocky:linux:libcurl-debuginfo, p-cpe:/a:rocky:linux:curl, p-cpe:/a:rocky:linux:libcurl-minimal-debuginfo, p-cpe:/a:rocky:linux:curl-debugsource, p-cpe:/a:rocky:linux:curl-debuginfo, p-cpe:/a:rocky:linux:libcurl-minimal

Required KB Items: Host/local_checks_enabled, Host/RockyLinux/release, Host/RockyLinux/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 10/6/2023

Vulnerability Publication Date: 3/20/2023

Reference Information

CVE: CVE-2023-27536, CVE-2023-28321

IAVA: 2023-A-0153-S, 2023-A-0259-S