CVE-2016-8625

curl before version 7.51.0 uses outdated IDNA 2003 standard to handle International Domain Names and this may lead users to potentially and unknowingly issue network transfer requests to the wrong host.
References
Link Resource
http://www.securityfocus.com/bid/94107 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1037192 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2018:2486 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3558 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8625 Issue Tracking Patch Third Party Advisory
https://curl.haxx.se/CVE-2016-8625.patch Patch Vendor Advisory
https://curl.haxx.se/docs/adv_20161102K.html Patch Vendor Advisory
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201701-47 Third Party Advisory
https://www.tenable.com/security/tns-2016-21 Third Party Advisory
http://www.securityfocus.com/bid/94107 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1037192 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2018:2486 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3558 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8625 Issue Tracking Patch Third Party Advisory
https://curl.haxx.se/CVE-2016-8625.patch Patch Vendor Advisory
https://curl.haxx.se/docs/adv_20161102K.html Patch Vendor Advisory
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201701-47 Third Party Advisory
https://www.tenable.com/security/tns-2016-21 Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:59

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/94107 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/94107 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1037192 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1037192 - Third Party Advisory, VDB Entry
References () https://access.redhat.com/errata/RHSA-2018:2486 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:2486 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:3558 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:3558 - Third Party Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8625 - Issue Tracking, Patch, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8625 - Issue Tracking, Patch, Third Party Advisory
References () https://curl.haxx.se/CVE-2016-8625.patch - Patch, Vendor Advisory () https://curl.haxx.se/CVE-2016-8625.patch - Patch, Vendor Advisory
References () https://curl.haxx.se/docs/adv_20161102K.html - Patch, Vendor Advisory () https://curl.haxx.se/docs/adv_20161102K.html - Patch, Vendor Advisory
References () https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E - () https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E -
References () https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E - () https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E -
References () https://security.gentoo.org/glsa/201701-47 - Third Party Advisory () https://security.gentoo.org/glsa/201701-47 - Third Party Advisory
References () https://www.tenable.com/security/tns-2016-21 - Third Party Advisory () https://www.tenable.com/security/tns-2016-21 - Third Party Advisory
CVSS v2 : 5.0
v3 : 7.5
v2 : 5.0
v3 : 5.3

07 Nov 2023, 02:36

Type Values Removed Values Added
References
  • {'url': 'https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E', 'name': '[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8', 'tags': [], 'refsource': 'MLIST'}
  • {'url': 'https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E', 'name': '[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8', 'tags': [], 'refsource': 'MLIST'}
  • () https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E -
  • () https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E -

Information

Published : 2018-08-01 06:29

Updated : 2024-11-21 02:59


NVD link : CVE-2016-8625

Mitre link : CVE-2016-8625

CVE.ORG link : CVE-2016-8625


JSON object : View

Products Affected

haxx

  • curl
CWE
CWE-20

Improper Input Validation