linux.oracle.com
Open in
urlscan Pro
2a02:26f0:3100:785::a15
Public Scan
URL:
https://linux.oracle.com/cve/CVE-2022-32208.html
Submission: On July 16 via api from GB — Scanned from GB
Submission: On July 16 via api from GB — Scanned from GB
Form analysis
0 forms found in the DOMText Content
Oracle * ULN * Support * Documentation * Downloads STAY CONNECTED: * Facebook * Twitter * LinkedIn * YouTube * Blog CVE-2022-32208 * ULN > * Oracle Linux CVE repository > * CVE-2022-32208 CVE DETAILS Release Date:2022-07-07 DESCRIPTION When curl < 7.84.0 does FTP transfers secured by krb5, it handles message verification failures wrongly. This flaw makes it possible for a Man-In-The-Middle attack to go unnoticed and even allows it to inject data to the client. See more information about CVE-2022-32208 from MITRE CVE dictionary and NIST NVD CVSS V3.0 METRICS NOTE: The following CVSS v3.0 metrics and score provided are preliminary and subject to review. Base Score: 5.9 Base Metrics: AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N Access Vector: Network Attack Complexity: High Privileges Required: None User Interaction: None Scope: Unchanged Confidentiality Impact: High Integrity Impact: None Availability Impact: None ERRATA INFORMATION PlatformErrataRelease Date Oracle Linux version 8 (curl)ELSA-2022-61592022-08-24Oracle Linux version 9 (curl)ELSA-2022-61572022-08-25 This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team TECHNICAL INFORMATION * Oracle Linux Certified Hardware * Oracle Linux Supported Releases ORACLE LINUX SUPPORT * Oracle Linux Support * Oracle Premier Support for Systems * Advanced Customer Services CONNECT * Facebook * Twitter * LinkedIn * YouTube * Blog CONTACT US * Global contacts * Oracle 1-800-633-0691 Subscribe | Careers | Contact Us | Legal Notices | Terms of Use | Your Privacy Rights