When curl is told to use the Certificate Status Request TLS extension, often referred to as OCSP stapling, to verify that the server certificate is valid, it might fail to detect some OCSP problems and instead wrongly consider the response as fine. If the returned status reports another error than 'revoked' (like for example 'unauthorized') it is not treated as a bad certficate.
CVSS
No CVSS.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2024/09/11/1 | Mailing List Third Party Advisory |
https://curl.se/docs/CVE-2024-8096.html | Vendor Advisory |
https://curl.se/docs/CVE-2024-8096.json | Vendor Advisory |
https://hackerone.com/reports/2669852 | Exploit Issue Tracking Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2024/11/msg00008.html | Mailing List Third Party Advisory |
https://security.netapp.com/advisory/ntap-20241011-0005/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
History
30 Jul 2025, 19:42
Type | Values Removed | Values Added |
---|---|---|
First Time |
Haxx
Netapp ontap Select Deploy Administration Utility Netapp ontap Tools Netapp h300s Netapp active Iq Unified Manager Netapp h500s Netapp h500s Firmware Netapp bootstrap Os Netapp h410s Firmware Netapp h700s Firmware Netapp h300s Firmware Haxx curl Debian debian Linux Netapp h410s Netapp Netapp h700s Netapp hci Compute Node Debian |
|
CPE | cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:* cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:* cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:* cpe:2.3:a:netapp:ontap_tools:10:*:*:*:*:vmware_vsphere:*:* cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:* cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:* cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:bootstrap_os:-:*:*:*:*:*:*:* |
|
References |
|
|
References | () https://curl.se/docs/CVE-2024-8096.html - Vendor Advisory | |
References | () https://curl.se/docs/CVE-2024-8096.json - Vendor Advisory | |
References | () https://hackerone.com/reports/2669852 - Exploit, Issue Tracking, Third Party Advisory |
11 Sep 2024, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-09-11 10:15
Updated : 2025-07-30 19:42
NVD link : CVE-2024-8096
Mitre link : CVE-2024-8096
JSON object : View
Products Affected
debian
- debian_linux
netapp
- h410s
- h500s
- bootstrap_os
- h300s
- h410s_firmware
- h500s_firmware
- h700s_firmware
- h700s
- ontap_select_deploy_administration_utility
- active_iq_unified_manager
- ontap_tools
- h300s_firmware
- hci_compute_node
haxx
- curl
CWE
No CWE.