CVE-2016-8624
Publication date 2 November 2016
Last updated 25 August 2025
Ubuntu priority
Cvss 3 Severity Score
Description
curl before version 7.51.0 doesn't parse the authority component of the URL correctly when the host name part ends with a '#' character, and could instead be tricked into connecting to a different host. This may have security implications if you for example use an URL parser that follows the RFC to check for allowed domains before using curl to request them.
Status
| Package | Ubuntu Release | Status |
|---|---|---|
| curl | ||
| 16.04 LTS xenial |
Fixed 7.47.0-1ubuntu2.2
|
|
| 14.04 LTS trusty |
Fixed 7.35.0-1ubuntu2.10
|
|
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score |
|
| Attack vector | Network |
| Attack complexity | Low |
| Privileges required | None |
| User interaction | None |
| Scope | Unchanged |
| Confidentiality | None |
| Integrity impact | High |
| Availability impact | None |
| Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N |
References
Related Ubuntu Security Notices (USN)
- USN-3123-1
- curl vulnerabilities
- 3 November 2016