High severity7.5NVD Advisory· Published Oct 3, 2016· Updated May 6, 2026
CVE-2016-7141
CVE-2016-7141
Description
curl and libcurl before 7.50.2, when built with NSS and the libnsspem.so library is available at runtime, allow remote attackers to hijack the authentication of a TLS connection by leveraging reuse of a previously loaded client certificate from file for a connection for which no certificate has been set, a different vulnerability than CVE-2016-5420.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
12- curl.haxx.se/docs/adv_20160907.htmlnvdPatchVendor Advisory
- github.com/curl/curl/commit/curl-7_50_2~32nvdIssue TrackingPatch
- lists.opensuse.org/opensuse-updates/2016-09/msg00094.htmlnvdThird Party Advisory
- www.securityfocus.com/bid/92754nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1036739nvdThird Party AdvisoryVDB Entry
- bugzilla.redhat.com/show_bug.cginvdIssue Tracking
- rhn.redhat.com/errata/RHSA-2016-2575.htmlnvd
- rhn.redhat.com/errata/RHSA-2016-2957.htmlnvd
- www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.htmlnvd
- access.redhat.com/errata/RHSA-2018:3558nvd
- lists.debian.org/debian-lts-announce/2018/11/msg00005.htmlnvd
- security.gentoo.org/glsa/201701-47nvd
News mentions
0No linked articles in our index yet.