Red Hat Bugzilla – Bug 1388371
CVE-2016-8616 curl: Case insensitive password comparison
Last modified: 2018-08-16 12:07:10 EDT
When re-using a connection, curl was doing case insensitive comparisons of user name and password with the existing connections. This means that if an unused connection with proper credentials exists for a protocol that has connection-scoped credentials, an attacker can cause that connection to be reused if s/he knows the case-insensitive version of the correct password. External References: https://curl.haxx.se/docs/adv_20161102B.html
Created attachment 1213770 [details] Upstream patch
Created curl tracking bugs for this issue: Affects: fedora-all [bug 1390894]
Created mingw-curl tracking bugs for this issue: Affects: fedora-all [bug 1390895] Affects: epel-7 [bug 1390896]
I want to point out again that this is only a problem if the attacker already knows a case-insensitive version of the password, which is a bigger problem in itself.
This issue has been addressed in the following products: Red Hat JBoss Core Services Via RHSA-2018:2486 https://access.redhat.com/errata/RHSA-2018:2486