{"id":23091,"date":"2022-01-21T01:12:45","date_gmt":"2022-01-21T00:12:45","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=23091"},"modified":"2024-10-05T21:33:39","modified_gmt":"2024-10-05T19:33:39","slug":"windows-january-2022-security-updates-for-curl-vulnerability-cve-2021-22947-a-tough-task-for-security-reporters","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2022\/01\/21\/windows-january-2022-security-updates-for-curl-vulnerability-cve-2021-22947-a-tough-task-for-security-reporters\/","title":{"rendered":"Windows January 2022 security updates for cURL vulnerability CVE-2021-22947 &#8211; a tough task for security reporters"},"content":{"rendered":"<p><img decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" title=\"Sicherheit (Pexels, allgemeine Nutzung)\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2021\/04\/Sicherheit_klein.jpg\" alt=\"Sicherheit (Pexels, allgemeine Nutzung)\" width=\"200\" align=\"left\" \/>[<a href=\"https:\/\/www.borncity.com\/blog\/2022\/01\/21\/windows-januar-2022-sicherheitsupdates-fr-curl-schwachstelle-cve-2021-22947-ein-zhes-unterfangen\/\" target=\"_blank\" rel=\"noopener\">German<\/a>]As of January 11, 2022, Microsoft has closed the CVE-2021-22947 vulnerability in Windows 10, Windows 11 and their server counterparts with various security updates. The CVE-2021-22947 vulnerability affects the Curl library and was reported by German security researcher Stefan Kanthak back in the summer of 2021. I have the tenacious correspondence between Kanthak and the MSRC, so I can rehash this case here in the blog.<\/p>\n<p><!--more--><\/p>\n<h2>This is what cURL is all about<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vg04.met.vgwort.de\/na\/a289b0dde4bf405bb51606713d97a3d5\" alt=\"\" width=\"1\" height=\"1\" \/>Microsoft has included the cURL package with Windows 10 since the beginning of 2018. This is both a program library and a command line program for transferring files in computer networks. cURL is under the open MIT license and has been ported to various operating systems.<\/p>\n<p>However, Microsoft has the problem that they are trumpeting that they will deliver cURL with Windows 10 (and currently Windows 11). But the maintenance of the cURL package, especially with regard to closing known vulnerabilities, is Microsoft-like. The package is not patched for two years, and a remote code execution vulnerability in cURL that is classified as critical takes more than half a year &#8211; and 3 months after its disclosure &#8211; to be patched. And the Janauar 2022 patch may not be installed due to collateral damage.<\/p>\n<h2>cURL vulnerability: Microsoft's first confirmation<\/h2>\n<p>Vulnerability <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-22947\" target=\"_blank\" rel=\"noopener\">CVE-2021-22945<\/a> exists in the cURL package. When curl &gt;= 7.20.0 and &lt;= 7.78.0 connects to an IMAP or POP3 server to retrieve data using STARTTLS and switch to TLS security, the server can respond and return multiple responses at once, which curl caches. curl then switches to TLS, but does not empty the queue of cached responses, but continues to use and trust the responses it received *before* the TLS handshake, as if they were authenticated.<\/p>\n<p>Through this vulnerability, a man-in-the-middle attacker can first inject the forged responses, then pass TLS traffic from the legitimate server and trick curl into sending data back to the user, assuming that the data injected by the attacker comes from the TLS-protected server.<\/p>\n<p>The vulnerability was discovered by Stefan Kanthak and reported to Microsoft. I do not have the initial message from Kanthak to the Microsoft Security Response Center (MSRC) because Stefan Kanthak only provided me with an excerpt of the correspondence. On Monday, July 26, 2021, the MSRC confirmed the reported problem in Curl:<\/p>\n<blockquote><p>From: Microsoft Security Response Center<br \/>\nReceived: Mon Jul 26 2021 08:05:07 GMT-0700 (Pacific Daylight Time)<br \/>\nTo: Stefan Kanthak<br \/>\nSubject: MSRC Case 66388 CRM:0461283373<\/p>\n<p>Hi Stefan,<\/p>\n<p>Here's an update on your case:<\/p>\n<p>MSRC Case 66388<\/p>\n<p>We confirmed the behavior you reported. We'll continue our investigation and determine how to address this issue.<\/p>\n<p>Please let me know if you have additional information that could aid our investigation, or if you have questions.<\/p>\n<p>Thanks!<\/p>\n<p>Duncan<br \/>\nMSRC<\/p><\/blockquote>\n<p>At this point, one could have indulged in the idea that the vulnerabilities would be closed by the upcoming patchday.<\/p>\n<h2>Fix promised in October 2021 did arrive<\/h2>\n<p>After this case seemed to somehow fizzle out (no fix in October 2021; however, according to the text below, a patch was promised by Microsoft for October 2021), Stefan Kanthak followed up again on October 12, 2021<\/p>\n<blockquote><p>From: Stefan Kanthak<br \/>\nReceived: Tue Oct 12 2021 15:45:15 GMT-0700 (Pacific Daylight Time)<br \/>\nTo: &lt;Microsoft Security Response Center&gt;; Microsoft Security Response Center; Microsoft Security Response Center<br \/>\nSubject: Re: MSRC Case 66388 CRM:0461283373<\/p>\n<p>Duncan &lt;secure@microsoft.com&gt; wrote Thursday, August 05, 2021 2:09 AM:<\/p>\n<p>&gt; Hello Stefan,<br \/>\n&gt;<br \/>\n&gt; Thank you for working with the MSRC!<br \/>\n&gt;<br \/>\n&gt; The fix is in development for your report, and is scheduled to be<br \/>\n&gt; released in the October Microsoft Security Release on October 12th.<\/p>\n<p>WTF happened?<\/p>\n<p>1. Neither <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2021-Oct\" target=\"_blank\" rel=\"noopener\">Link<\/a> nor <a href=\"https:\/\/support.microsoft.com\/help\/5006670\/\" target=\"_blank\" rel=\"noopener\">KB5006670<\/a> nor <a href=\"https:\/\/support.microsoft.com\/help\/5006672\/\" target=\"_blank\" rel=\"noopener\">KB5006672<\/a> list an update for <em>curl.exe<\/em><\/p>\n<p>2. Link <a href=\"https:\/\/support.microsoft.com\/help\/5006672\/\" target=\"_blank\" rel=\"noopener\">KB5006672<\/a> doesn't list curl.exe!<\/p>\n<p>3. 5006672.csv but lists the VULNERABLE and OUTDATED curl.exe 7.55.1, built more than 2 years ago:<\/p>\n<p>| curl.exe,7.55.1.0,12-Aug-2019,19:46,\"386,048\"<br \/>\n| curl.exe,7.55.1.0,12-Aug-2019,20:28,\"421,376\"<br \/>\n| curl.exe,7.55.1.0,12-Aug-2019,19:46,\"386,048\"<br \/>\n&#8230;<br \/>\n| Windows 10 version 1809 LCU Arm64-based,,,,<br \/>\n| File name,File version,Date,Time,File size<br \/>\n| curl.exe,7.55.1.0,12-Aug-2019,19:37,\"330,240\"<br \/>\n&#8230;<br \/>\n| curl.exe,7.55.1.0,12-Aug-2019,19:46,\"386,048\"<br \/>\n&#8230;<br \/>\n| curl.exe,7.55.1.0,12-Aug-2019,20:22,\"435,712\"<\/p>\n<p>You had more than TWO FULL MONTHS to build curl.exe from its CURRENT sources, but FAILED MISERABLY to do so!<br \/>\nWhat happened to Bill Gates' \"trustworthy computing\"?<br \/>\nIT'S A REAL SHAME!<\/p>\n<p>&gt; Will that date work for you for a disclosure date?<\/p>\n<p>NOT ANY MORE!<\/p>\n<p>&gt; Thank you again for working with us,<\/p>\n<p>not amused<br \/>\nStefan Kanthak<\/p><\/blockquote>\n<p>In October 2021, Windows 10 and Windows 11 (as well as their server counterparts) will ship with a curl version 7.55.1.0 dated August 14, 2017. There are numerous known vulnerabilities in this ancient version (it has been compiled by Microsoft in 2019). Microsoft's (MSRC) response to Kanthak's request came on October 12, 2021, confirming that the curl vulnerability has not been patched. The response from Microsoft (MSRC) came on October 12, 2021, confirming that the Curl vulnerability was not patched.<\/p>\n<blockquote><p>Received: Tue Oct 12 2021 16:27:50 GMT-0700 (Pacific Daylight Time)To: &lt;Microsoft Security Response Center&gt;; Microsoft Security Response Center; Microsoft Security Response Center; Stefan KanthakSubject: Re: MSRC Case 66388 CRM:0461283373Hello Stefan,<\/p>\n<p>Thank you for checking back on the status of your submission. You are correct that the update for Curl was not included in this<br \/>\nmonth's security update release. We are checking on the status of your case and will respond once we have an understanding of the<br \/>\nengineering groups' plans.<\/p>\n<p>Our apologies for the confusion.<\/p>\n<p>Thank you for working with MSRC.<br \/>\nDuncan<br \/>\nMSRC<\/p><\/blockquote>\n<p>Stefan Kanthak then <a href=\"https:\/\/seclists.org\/fulldisclosure\/2021\/Oct\/17\" target=\"_blank\" rel=\"noopener\">published the case on seclist.org<\/a> and writes the following there:<\/p>\n<blockquote><p>In December 2017, Microsoft announced to ship curl.exe and tar.exe<br \/>\nwith Windows 10:<br \/>\n&lt;Team Blog:Tar and curl come to Windows&gt;<\/p>\n<p>But they failed once again, MISERABLY, at least for curl: they took<br \/>\nthe sources released 2017-11-14, let them rot for 2 years, applied<br \/>\nsome patches, only to let them rot again since then!<\/p>\n<p>| C:\\Users\\Public&gt;winver<br \/>\n| Microsoft Windows [Version 10.0.19042.1083]<br \/>\n|<br \/>\n| C:\\Users\\Public&gt;curl -V<br \/>\n| curl 7.55.1 (Windows) libcurl\/7.55.1 WinSSL<br \/>\n| Release-Date: 2017-11-14, security patched: 2019-11-05<br \/>\n| Protocols: dict file ftp ftps http https imap imaps pop3 pop3s smtp smtps telnet tftp<br \/>\n| Features: AsynchDNS IPv6 Largefile SSPI Kerberos SPNEGO NTLM SSL<\/p>\n<p>Version 7.55.1 is 34 releases and at least 15 (in words: FIFTEEN)<br \/>\nCVEs behind the current version 7.79.1: see<br \/>\n&lt;<a href=\"https:\/\/curl.se\/docs\/releases.html\" target=\"_blank\" rel=\"noopener\">https:\/\/curl.se\/docs\/releases.html<\/a>&gt; and<br \/>\n&lt;<a href=\"https:\/\/curl.se\/docs\/vulnerabilities.html\" target=\"_blank\" rel=\"noopener\">https:\/\/curl.se\/docs\/vulnerabilities.html<\/a>&gt;<\/p>\n<p>Most obviously Microsoft's processes are so bad that they can't<br \/>\nbuild a current version and have to ship ROTTEN software instead!<\/p>\n<p>stay tuned, and far away from such poorly maintained crap<\/p><\/blockquote>\n<p>So, Microsoft has been shipping <em>curl.exe<\/em> with Windows 10 since the beginning of 2018 (the most secure Windows ever at the time, according to the manufacturer). However, Microsoft lets the old version of <em>curl.exe<\/em> really rot for two years without caring about patches. Only at the end of 2019, some patches will be incorporated into a curl version. Then again, there will be no changes for two years, and no security updates.<\/p>\n<p>At the time the above vulnerability was reported by Stefan Kanthak, at least 20 vulnerabilities in curl were known and closed in the open source variant. Only Microsoft sleeps the sleep of the righteous. This leaves the observer speechless &#8211; although: This is Microsoft's program &#8211; I know other cases where libraries in ancient versions were integrated into products and diligently distributed.<\/p>\n<h2>Christmas something is happening &#8230;<\/h2>\n<p>On December 24, 2021, Microsoft sent the following answer to Stefan Kanthak:<\/p>\n<blockquote><p>From: \"Microsoft Security Response Center\" &lt;secure@microsoft.com&gt;<br \/>\nTo: \"Microsoft Security Response Center\" &lt;secure@microsoft.com&gt;; \"Microsoft Security Response Center\" &lt;secure@microsoft.com&gt;;<br \/>\n\"Microsoft Security Response Center\" &lt;secure@microsoft.com&gt;; \"Microsoft Security Response Center\" &lt;secure@microsoft.com&gt;; \"Stefan Kanthak\" &lt;stefan.kanthak@nexgo.de&gt;<br \/>\nSent: Friday, December 24, 2021 12:05 AM<br \/>\nSubject: RE: Re: MSRC Case 66388 CRM:0461283373<\/p>\n<p>Hello Stefan,<\/p>\n<p>The fix in development for your report has completed testing and is tentatively scheduled to be released in the upcoming Microsoft Security Release on January11th 2022. We will be referencing some of the CVEs that CURL has issued for recent updates, including CVE-2022-22947. While unlikely this is still subject to change, and I will be sure to notify you of any updates.<\/p>\n<p>Thank you again for working with us,<\/p>\n<p>Duncan<\/p>\n<p>MSRCFrom: Microsoft Security Response Center<\/p><\/blockquote>\n<p>There the fix was promised for January 11, 2022.<\/p>\n<h2>&#8230; but it will be January 2022<\/h2>\n<p>In fact, an update really came on January 11, 2022 (Patchday) and the remote code execution vulnerability <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2021-22947\" target=\"_blank\" rel=\"noopener\">CVE-2021-22947<\/a> in <em>curl<\/em>, which was rated critical, was closed in Windows 10 20H2 to 21H2, Windows Server 2022 as well as in Windows 11. The CVE had been requested via Hacker One, a description of CVE-2021-22947 can be found <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-22947\" target=\"_blank\" rel=\"noopener\">here<\/a> und <a href=\"https:\/\/curl.se\/docs\/security.html\" target=\"_blank\" rel=\"noopener\">hier<\/a>.<\/p>\n<p>In the meantime, Microsoft has identified Stefan Kanthak as the discoverer of the vulnerability &#8211; which probably only happened after another inquiry. Kanthak wrote in an email \"The Redmond company doesn't have enough time to thank me\". It is quite sportive, if a critical RCE vulnerability in a Curl library is fixed only after half a year.\u00a0 That's security by Microsoft &#8211; well girls and gals, keep your Windows and software updated &#8211; and hope, the vendor will patches vulnerabilities soon enough.<\/p>\n<p><strong>Similar articles<br \/>\n<\/strong><a href=\"https:\/\/borncity.com\/win\/2018\/08\/20\/windows-10-and-the-onedrive-vulnerabilities-part-1\/\">Windows 10 and the OneDrive vulnerabilities<\/a>\u00a0\u2013 Part 1<br \/>\n<a href=\"https:\/\/borncity.com\/win\/2018\/08\/20\/windows-10-and-the-onedrive-vulnerabilities-part-2\/\">Windows 10 and the OneDrive vulnerabilities<\/a>\u00a0\u2013 Part 2<br \/>\n<a href=\"https:\/\/borncity.com\/win\/2018\/08\/20\/windows-10-and-the-onedrive-vulnerabilities-part-3\/\">Windows 10 and the OneDrive vulnerabilities<\/a>\u00a0\u2013 Part 3<br \/>\n<a href=\"https:\/\/borncity.com\/win\/2018\/08\/22\/vulnerabilities-in-microsoft-visual-c-runtime\/\">Vulnerabilities in Microsoft Visual C++ Runtime<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/01\/25\/edge-and-its-lousy-installer-security\/\">Edge and its poor installer security<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/01\/20\/microsoft-teams-and-its-security\/\">Microsoft Teams and it's security<\/a><br \/>\nEdge: Has Microsoft lost its track?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]As of January 11, 2022, Microsoft has closed the CVE-2021-22947 vulnerability in Windows 10, Windows 11 and their server counterparts with various security updates. The CVE-2021-22947 vulnerability affects the Curl library and was reported by German security researcher Stefan Kanthak &hellip; <a href=\"https:\/\/borncity.com\/win\/2022\/01\/21\/windows-january-2022-security-updates-for-curl-vulnerability-cve-2021-22947-a-tough-task-for-security-reporters\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580,22,2],"tags":[69,195,194],"class_list":["post-23091","post","type-post","status-publish","format-standard","hentry","category-security","category-update","category-windows","tag-security","tag-update","tag-windows"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/23091","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=23091"}],"version-history":[{"count":2,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/23091\/revisions"}],"predecessor-version":[{"id":35847,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/23091\/revisions\/35847"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=23091"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=23091"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=23091"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}