Inadvertently Storing SSL Session IDs in Cache Leads to Security Risks
CVE-2024-0853

5.3MEDIUM

Key Information:

Vendor

Curl

Status
Vendor
CVE Published:
3 February 2024

What is CVE-2024-0853?

curl inadvertently kept the SSL session ID for connections in its cache even when the verify status (OCSP stapling) test failed. A subsequent transfer to the same hostname could then succeed if the session ID cache was still fresh, which then skipped the verify status check.

Affected Version(s)

curl 8.5.0

References

CVSS V3.1

Score:
5.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Hiroki Kurosawa
Daniel Stenberg
.