curl before version 7.52.1 is vulnerable to an uninitialized random in libcurl's internal function that returns a good 32bit random value. Having a weak or virtually non-existent random value makes the operations that use it vulnerable.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/95094 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1037528 | VDB Entry Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9594 | Issue Tracking Third Party Advisory |
https://curl.haxx.se/docs/adv_20161223.html | Vendor Advisory |
https://security.gentoo.org/glsa/201701-47 | Third Party Advisory |
https://www.tenable.com/security/tns-2017-04 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: redhat
Published: 2018-04-23T19:00:00
Updated: 2018-04-24T19:57:01
Reserved: 2016-11-23T00:00:00
Link: CVE-2016-9594
JSON object: View
NVD Information
Status : Modified
Published: 2018-04-23T19:29:00.233
Modified: 2023-11-07T02:37:14.667
Link: CVE-2016-9594
JSON object: View
Redhat Information
No data.
CWE