CVE-2024-8096

When curl is told to use the Certificate Status Request TLS extension, often referred to as OCSP stapling, to verify that the server certificate is valid, it might fail to detect some OCSP problems and instead wrongly consider the response as fine.  If the returned status reports another error than 'revoked' (like for example 'unauthorized') it is not treated as a bad certficate.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.5 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
curlCNA
---
---
CVEADP
---
---
CISA-ADPADP
6.5 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 38%
VendorProductVersion
curlcurl
8.9.1 ≤
𝑥
≤ 8.9.1
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
curl
bullseye
vulnerable
bullseye (security)
7.74.0-1.3+deb11u14
fixed
bookworm
7.88.1-10+deb12u12
fixed
bookworm (security)
vulnerable
sid
8.13.0-5
fixed
trixie
8.13.0-5
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
curl
plucky
Fixed 8.9.1-2ubuntu2
released
oracular
Fixed 8.9.1-2ubuntu2
released
noble
Fixed 8.5.0-2ubuntu10.4
released
jammy
Fixed 7.81.0-1ubuntu1.18
released
focal
Fixed 7.68.0-1ubuntu2.24
released
bionic
needs-triage
xenial
needs-triage
trusty
needs-triage