Unrated severityNVD Advisory· Published Jan 15, 2015· Updated May 6, 2026
CVE-2014-8150
CVE-2014-8150
Description
CRLF injection vulnerability in libcurl 6.0 through 7.x before 7.40.0, when using an HTTP proxy, allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via CRLF sequences in a URL.
Affected products
119cpe:2.3:a:haxx:libcurl:6.0:*:*:*:*:*:*:*+ 113 more
- cpe:2.3:a:haxx:libcurl:6.0:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:6.1:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:6.1:beta:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:6.2:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:6.3:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:6.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:6.4:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:6.5:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:6.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:6.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.1:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.10:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.10.1:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.10.2:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.10.3:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.10.4:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.10.5:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.10.6:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.10.7:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.10.8:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.11.0:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.11.1:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.11.2:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.12.0:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.12.1:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.12.2:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.12.3:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.13.0:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.13.1:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.13.2:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.14.0:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.14.1:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.15.0:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.15.1:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.15.2:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.15.3:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.15.4:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.15.5:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.16.0:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.16.1:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.16.2:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.16.3:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.16.4:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.17.0:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.18.1:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.19.0:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.19.1:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.19.2:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.19.4:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.19.5:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.19.6:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.19.7:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.2:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.20.1:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.21.0:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.21.1:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.21.3:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.21.4:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.21.5:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.21.6:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.21.7:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.23.1:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.24.0:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.25.0:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.29.0:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.3:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.30.0:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.37.1:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.38.0:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.39:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.4:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.5:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.6:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.7:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.7.1:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.7.2:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.7.3:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.8:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.8.1:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.9:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.9.1:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.9.2:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.9.3:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.9.4:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.9.5:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.9.6:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.9.7:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.9.8:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*+ 3 more
- cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
24- curl.haxx.se/docs/adv_20150108B.htmlnvdVendor Advisory
- advisories.mageia.org/MGASA-2015-0020.htmlnvd
- kb.juniper.net/InfoCenter/indexnvd
- lists.apple.com/archives/security-announce/2015/Aug/msg00001.htmlnvd
- lists.fedoraproject.org/pipermail/package-announce/2015-January/147856.htmlnvd
- lists.fedoraproject.org/pipermail/package-announce/2015-January/147876.htmlnvd
- lists.fedoraproject.org/pipermail/package-announce/2015-May/156945.htmlnvd
- lists.fedoraproject.org/pipermail/package-announce/2015-May/157188.htmlnvd
- lists.opensuse.org/opensuse-updates/2015-02/msg00040.htmlnvd
- rhn.redhat.com/errata/RHSA-2015-1254.htmlnvd
- secunia.com/advisories/61925nvd
- secunia.com/advisories/62075nvd
- secunia.com/advisories/62361nvd
- www.debian.org/security/2015/dsa-3122nvd
- www.mandriva.com/security/advisoriesnvd
- www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.htmlnvd
- www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.htmlnvd
- www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.htmlnvd
- www.securityfocus.com/bid/71964nvd
- www.securitytracker.com/id/1032768nvd
- www.ubuntu.com/usn/USN-2474-1nvd
- kc.mcafee.com/corporate/indexnvd
- security.gentoo.org/glsa/201701-47nvd
- support.apple.com/kb/HT205031nvd
News mentions
0No linked articles in our index yet.