Name | CVE-2015-3153 |
Description | The default configuration for cURL and libcurl before 7.42.1 sends custom HTTP headers to both the proxy and destination server, which might allow remote proxy servers to obtain sensitive information by reading the header contents. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DSA-3240-1 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
curl (PTS) | bullseye | 7.74.0-1.3+deb11u13 | fixed |
| bullseye (security) | 7.74.0-1.3+deb11u14 | fixed |
| bookworm | 7.88.1-10+deb12u8 | fixed |
| bookworm (security) | 7.88.1-10+deb12u5 | fixed |
| sid, trixie | 8.11.0-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
curl | source | jessie | 7.38.0-4+deb8u2 | | DSA-3240-1 | |
curl | source | (unstable) | 7.42.1-1 | | | |
Notes
[wheezy] - curl <no-dsa> (Too intrusive to backport)
[squeeze] - curl <no-dsa> (Too intrusive to backport)
http://curl.haxx.se/docs/adv_20150429.html