Amazon Linux AMI update for curl



Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2024-0853
CWE-ID CWE-299
Exploitation vector Network
Public exploit N/A
Vulnerable software
Amazon Linux AMI
Operating systems & Components / Operating system

curl
Operating systems & Components / Operating system package or component

Vendor Amazon Web Services

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Improper check for certificate revocation

EUVDB-ID: #VU85927

Risk: Low

CVSSv4.0: 1.7 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-0853

CWE-ID: CWE-299 - Improper Check for Certificate Revocation

Exploit availability: No

Description

The vulnerability allows a remote attacker to bypass OCSP verification.

The vulnerability exists due to curl inadvertently keeps the SSL session ID for connections in its cache even when the verify status (OCSP stapling) test has failed. A subsequent transfer to the same hostname will be successful if the session ID cache is still fresh, which leads to skipping the verify status check. As a result, OCSP verification is always successful for all subsequent TLS sessions.

Mitigation

Update the affected packages:

aarch64:
    libcurl-minimal-debuginfo-8.5.0-1.amzn2023.0.3.aarch64
    curl-minimal-debuginfo-8.5.0-1.amzn2023.0.3.aarch64
    libcurl-debuginfo-8.5.0-1.amzn2023.0.3.aarch64
    curl-minimal-8.5.0-1.amzn2023.0.3.aarch64
    libcurl-minimal-8.5.0-1.amzn2023.0.3.aarch64
    curl-debugsource-8.5.0-1.amzn2023.0.3.aarch64
    curl-debuginfo-8.5.0-1.amzn2023.0.3.aarch64
    curl-8.5.0-1.amzn2023.0.3.aarch64
    libcurl-8.5.0-1.amzn2023.0.3.aarch64
    libcurl-devel-8.5.0-1.amzn2023.0.3.aarch64

src:
    curl-8.5.0-1.amzn2023.0.3.src

x86_64:
    curl-8.5.0-1.amzn2023.0.3.x86_64
    curl-debugsource-8.5.0-1.amzn2023.0.3.x86_64
    curl-debuginfo-8.5.0-1.amzn2023.0.3.x86_64
    libcurl-minimal-debuginfo-8.5.0-1.amzn2023.0.3.x86_64
    libcurl-8.5.0-1.amzn2023.0.3.x86_64
    curl-minimal-8.5.0-1.amzn2023.0.3.x86_64
    libcurl-minimal-8.5.0-1.amzn2023.0.3.x86_64
    libcurl-debuginfo-8.5.0-1.amzn2023.0.3.x86_64
    curl-minimal-debuginfo-8.5.0-1.amzn2023.0.3.x86_64
    libcurl-devel-8.5.0-1.amzn2023.0.3.x86_64

Vulnerable software versions

Amazon Linux AMI: All versions

curl: before 8.5.0-1

CPE2.3 External links

https://alas.aws.amazon.com/AL2023/ALAS-2024-581.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###