libcurl would reuse a previously created connection even when a TLS or SSHrelated option had been changed that should have prohibited reuse.libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse if one of them matches the setup. However, several TLS andSSH settings were left out from the configuration match checks, making themmatch too easily.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2023/03/20/6 | Mailing List |
https://hackerone.com/reports/1555796 | Exploit Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html | Mailing List Third Party Advisory |
https://security.gentoo.org/glsa/202212-01 | Third Party Advisory |
https://security.netapp.com/advisory/ntap-20220609-0009/ | Third Party Advisory |
https://www.debian.org/security/2022/dsa-5197 | Mailing List Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
27 Mar 2024, 15:01
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2023/03/20/6 - Mailing List | |
CPE | cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:* cpe:2.3:a:splunk:universal_forwarder:9.1.0:*:*:*:*:*:*:* |
|
First Time |
Splunk
Splunk universal Forwarder |
Information
Published : 2022-06-02 14:15
Updated : 2024-03-27 15:01
NVD link : CVE-2022-27782
Mitre link : CVE-2022-27782
CVE.ORG link : CVE-2022-27782
JSON object : View
Products Affected
haxx
- curl
splunk
- universal_forwarder
debian
- debian_linux