CVE-2011-2192

The Curl_input_negotiate function in http_negotiate.c in libcurl 7.10.6 through 7.21.6, as used in curl and other products, always performs credential delegation during GSSAPI authentication, which allows remote servers to impersonate clients via GSSAPI requests.
References
Link Resource
http://curl.haxx.se/curl-gssapi-delegation.patch Broken Link
http://curl.haxx.se/docs/adv_20110623.html Vendor Advisory
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html Mailing List Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062287.html Mailing List Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061992.html Mailing List Third Party Advisory
http://secunia.com/advisories/45047 Third Party Advisory
http://secunia.com/advisories/45067 Third Party Advisory
http://secunia.com/advisories/45088 Third Party Advisory
http://secunia.com/advisories/45144 Third Party Advisory
http://secunia.com/advisories/45181 Third Party Advisory
http://secunia.com/advisories/48256 Third Party Advisory
http://security.gentoo.org/glsa/glsa-201203-02.xml Third Party Advisory
http://support.apple.com/kb/HT5130 Third Party Advisory
http://www.debian.org/security/2011/dsa-2271 Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2011:116 Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2011-0918.html Third Party Advisory
http://www.securitytracker.com/id?1025713 Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-1158-1 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=711454 Issue Tracking Third Party Advisory
http://curl.haxx.se/curl-gssapi-delegation.patch Broken Link
http://curl.haxx.se/docs/adv_20110623.html Vendor Advisory
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html Mailing List Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062287.html Mailing List Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061992.html Mailing List Third Party Advisory
http://secunia.com/advisories/45047 Third Party Advisory
http://secunia.com/advisories/45067 Third Party Advisory
http://secunia.com/advisories/45088 Third Party Advisory
http://secunia.com/advisories/45144 Third Party Advisory
http://secunia.com/advisories/45181 Third Party Advisory
http://secunia.com/advisories/48256 Third Party Advisory
http://security.gentoo.org/glsa/glsa-201203-02.xml Third Party Advisory
http://support.apple.com/kb/HT5130 Third Party Advisory
http://www.debian.org/security/2011/dsa-2271 Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2011:116 Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2011-0918.html Third Party Advisory
http://www.securitytracker.com/id?1025713 Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-1158-1 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=711454 Issue Tracking Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:15:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*

Configuration 5 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*

History

No history.

Information

Published : 2011-07-07 21:55

Updated : 2025-04-11 00:51


NVD link : CVE-2011-2192

Mitre link : CVE-2011-2192

CVE.ORG link : CVE-2011-2192


JSON object : View

Products Affected

debian

  • debian_linux

fedoraproject

  • fedora

haxx

  • libcurl

apple

  • mac_os_x

canonical

  • ubuntu_linux
CWE
CWE-255

Credentials Management Errors