Vulnerability Name:

CVE-2019-5443 (CCN-162844)

Assigned:2019-06-24
Published:2019-06-24
Updated:2021-11-03
Summary:A non-privileged user or program can put code and a config file in a known non-privileged path (under C:/usr/local/) that will make curl <= 7.65.1 automatically run the code (as an openssl "engine") on invocation. If that curl is invoked by a privileged user it can do anything it wants.
CVSS v3 Severity:7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
6.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): Required
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
7.8 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
6.8 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:4.4 Medium (CVSS v2 Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
6.8 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:S/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-427
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2019-5443

Source: MLIST
Type: Mailing List, Patch, Third Party Advisory
[oss-security] 20190624 curl: Windows OpenSSL engine code injection

Source: CCN
Type: Oracle CPUOct2019
Oracle Critical Patch Update Advisory - October 2019

Source: BID
Type: Broken Link
108881

Source: CCN
Type: Project curl Security Advisory, June 24th 2019
Windows OpenSSL engine code injection

Source: MISC
Type: Patch, Vendor Advisory
https://curl.haxx.se/docs/CVE-2019-5443.html

Source: XF
Type: UNKNOWN
libcurl-cve20195443-code-exec(162844)

Source: CONFIRM
Type: Third Party Advisory
https://security.netapp.com/advisory/ntap-20191017-0002/

Source: CCN
Type: IBM Security Bulletin 6379776 (Aspera Streaming)
cURL vulnerability CVE-2019-5443 impacts IBM Aspera Streaming/IBM Aspera Streaming for Video version 3.9.6.1 and earlier

Source: N/A
Type: Patch, Third Party Advisory
N/A

Source: MISC
Type: Patch, Third Party Advisory
https://www.oracle.com/security-alerts/cpuoct2020.html

Source: MISC
Type: Patch, Third Party Advisory
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html

Vulnerable Configuration:Configuration 1:
  • cpe:/a:haxx:curl:*:*:*:*:*:*:*:* (Version <= 7.65.1)
  • AND
  • cpe:/o:microsoft:windows:-:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:enterprise_manager_ops_center:12.4.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:http_server:12.2.1.4.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql_server:*:*:*:*:*:*:*:* (Version >= 5.0.0 and <= 5.7.27)
  • OR cpe:/a:oracle:mysql_server:*:*:*:*:*:*:*:* (Version >= 8.0.0 and <= 8.0.17)
  • OR cpe:/a:oracle:oss_support_tools:20.0:*:*:*:*:*:*:*

  • Configuration 3:
  • cpe:/a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
  • OR cpe:/a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:* (Version >= 7.3
  • OR cpe:/a:netapp:oncommand_unified_manager:*:*:*:*:*:vmware_vsphere:*:* (Version >= 9.5
  • OR cpe:/a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
  • OR cpe:/a:netapp:snapcenter:-:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:curl:libcurl:7.61.0:*:*:*:*:*:*:*
  • OR cpe:/a:curl:libcurl:7.60.0:*:*:*:*:*:*:*
  • OR cpe:/a:curl:libcurl:7.62.0:*:*:*:*:*:*:*
  • OR cpe:/a:curl:libcurl:7.63.0:*:*:*:*:*:*:*
  • OR cpe:/a:curl:libcurl:7.65.0:*:*:*:*:*:*:*
  • OR cpe:/a:curl:libcurl:7.64.0:*:*:*:*:*:*:*
  • AND
  • cpe:/a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:enterprise_manager_ops_center:12.4.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    haxx curl *
    microsoft windows -
    oracle enterprise manager ops center 12.3.3
    oracle enterprise manager ops center 12.4.0
    oracle http server 12.2.1.3.0
    oracle http server 12.2.1.4.0
    oracle mysql server *
    oracle mysql server *
    oracle oss support tools 20.0
    netapp oncommand insight -
    netapp oncommand unified manager *
    netapp oncommand unified manager *
    netapp oncommand workflow automation -
    netapp snapcenter -
    curl libcurl 7.61.0
    curl libcurl 7.60.0
    curl libcurl 7.62.0
    curl libcurl 7.63.0
    curl libcurl 7.65.0
    curl libcurl 7.64.0
    oracle enterprise manager ops center 12.3.3
    oracle enterprise manager ops center 12.4.0