Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.878728
Category:Fedora Local Security Checks
Title:Fedora: Security Advisory for curl (FEDORA-2020-ceaf490686)
Summary:The remote host is missing an update for the 'curl'; package(s) announced via the FEDORA-2020-ceaf490686 advisory.
Description:Summary:
The remote host is missing an update for the 'curl'
package(s) announced via the FEDORA-2020-ceaf490686 advisory.

Vulnerability Insight:
curl is a command line tool for transferring data with URL syntax, supporting
FTP, FTPS, HTTP, HTTPS, SCP, SFTP, TFTP, TELNET, DICT, LDAP, LDAPS, FILE, IMAP,
SMTP, POP3 and RTSP. curl supports SSL certificates, HTTP POST, HTTP PUT, FTP
uploading, HTTP form based upload, proxies, cookies, user+password
authentication (Basic, Digest, NTLM, Negotiate, kerberos...), file transfer
resume, proxy tunneling and a busload of other useful tricks.

Affected Software/OS:
'curl' package(s) on Fedora 33.

Solution:
Please install the updated package(s).

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:P/A:N

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2020-8286
https://cert-portal.siemens.com/productcert/pdf/ssa-200951.pdf
https://security.netapp.com/advisory/ntap-20210122-0007/
https://support.apple.com/kb/HT212325
https://support.apple.com/kb/HT212326
https://support.apple.com/kb/HT212327
Debian Security Information: DSA-4881 (Google Search)
https://www.debian.org/security/2021/dsa-4881
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG/
http://seclists.org/fulldisclosure/2021/Apr/50
http://seclists.org/fulldisclosure/2021/Apr/51
http://seclists.org/fulldisclosure/2021/Apr/54
https://security.gentoo.org/glsa/202012-14
https://curl.se/docs/CVE-2020-8286.html
https://hackerone.com/reports/1048457
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://lists.debian.org/debian-lts-announce/2020/12/msg00029.html
Common Vulnerability Exposure (CVE) ID: CVE-2020-8285
https://curl.se/docs/CVE-2020-8285.html
https://github.com/curl/curl/issues/6255
https://hackerone.com/reports/1045844
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
Common Vulnerability Exposure (CVE) ID: CVE-2020-8284
https://curl.se/docs/CVE-2020-8284.html
https://hackerone.com/reports/1040166
CopyrightCopyright (C) 2020 Greenbone Networks GmbH

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2021 E-Soft Inc. All rights reserved.