• 公告ID (KylinSec-SA-2024-3714)

摘要:

When curl is told to use the Certificate Status Request TLS extension, often referred to as OCSP stapling, to verify that the server certificate is valid, it might fail to detect some OCSP problems and instead wrongly consider the response as fine. If the returned status reports another error than revoked (like for example unauthorized ) it is not treated as a bad certficate.

安全等级: Low

公告ID: KylinSec-SA-2024-3714

发布日期: 2024年9月13日

关联CVE: CVE-2024-8096  

  • 详细介绍

1. 漏洞描述

   

When curl is told to use the Certificate Status Request TLS extension, often referred to as OCSP stapling, to verify that the server certificate is valid, it might fail to detect some OCSP problems and instead wrongly consider the response as fine. If the returned status reports another error than revoked (like for example unauthorized ) it is not treated as a bad certficate.

2. 影响范围

cve名称 产品 组件 是否受影响
CVE-2024-8096 KY3.4-5A curl Unaffected
CVE-2024-8096 KY3.5.2 curl Unaffected
CVE-2024-8096 V6 curl Unaffected

3. 影响组件

    无

4. 修复版本

    无

5. 修复方法

   无

6. 下载链接

    无
上一篇:KylinSec-SA-2024-3713 下一篇:KylinSec-SA-2024-3715