{"id":"CVE-2024-8096","summary":"OCSP stapling bypass with GnuTLS","details":"When curl is told to use the Certificate Status Request TLS extension, often referred to as OCSP stapling, to verify that the server certificate is valid, it might fail to detect some OCSP problems and instead wrongly consider the response as fine.  If the returned status reports another error than 'revoked' (like for example 'unauthorized') it is not treated as a bad certficate.","aliases":["CURL-CVE-2024-8096"],"modified":"2026-05-15T11:53:41.441782810Z","published":"2024-09-11T10:03:59.489Z","related":["CGA-73mp-jjfm-5663","SUSE-SU-2024:3202-1","SUSE-SU-2024:3203-1","SUSE-SU-2024:3204-1","SUSE-SU-2024:3211-1","SUSE-SU-2025:20239-1","openSUSE-SU-2024:14333-1"],"database_specific":{"unresolved_ranges":[{"extracted_events":[{"last_affected":"8.9.1"},{"last_affected":"8.9.0"},{"last_affected":"8.8.0"},{"last_affected":"8.7.1"},{"last_affected":"8.7.0"},{"last_affected":"8.6.0"},{"last_affected":"8.5.0"},{"last_affected":"8.4.0"},{"last_affected":"8.3.0"},{"last_affected":"8.2.1"},{"last_affected":"8.2.0"},{"last_affected":"8.1.2"},{"last_affected":"8.1.1"},{"last_affected":"8.1.0"},{"last_affected":"8.0.1"},{"last_affected":"8.0.0"},{"last_affected":"7.88.1"},{"last_affected":"7.88.0"},{"last_affected":"7.87.0"},{"last_affected":"7.86.0"},{"last_affected":"7.85.0"},{"last_affected":"7.84.0"},{"last_affected":"7.83.1"},{"last_affected":"7.83.0"},{"last_affected":"7.82.0"},{"last_affected":"7.81.0"},{"last_affected":"7.80.0"},{"last_affected":"7.79.1"},{"last_affected":"7.79.0"},{"last_affected":"7.78.0"},{"last_affected":"7.77.0"},{"last_affected":"7.76.1"},{"last_affected":"7.76.0"},{"last_affected":"7.75.0"},{"last_affected":"7.74.0"},{"last_affected":"7.73.0"},{"last_affected":"7.72.0"},{"last_affected":"7.71.1"},{"last_affected":"7.71.0"},{"last_affected":"7.70.0"},{"last_affected":"7.69.1"},{"last_affected":"7.69.0"},{"last_affected":"7.68.0"},{"last_affected":"7.67.0"},{"last_affected":"7.66.0"},{"last_affected":"7.65.3"},{"last_affected":"7.65.2"},{"last_affected":"7.65.1"},{"last_affected":"7.65.0"},{"last_affected":"7.64.1"},{"last_affected":"7.64.0"},{"last_affected":"7.63.0"},{"last_affected":"7.62.0"},{"last_affected":"7.61.1"},{"last_affected":"7.61.0"},{"last_affected":"7.60.0"},{"last_affected":"7.59.0"},{"last_affected":"7.58.0"},{"last_affected":"7.57.0"},{"last_affected":"7.56.1"},{"last_affected":"7.56.0"},{"last_affected":"7.55.1"},{"last_affected":"7.55.0"},{"last_affected":"7.54.1"},{"last_affected":"7.54.0"},{"last_affected":"7.53.1"},{"last_affected":"7.53.0"},{"last_affected":"7.52.1"},{"last_affected":"7.52.0"},{"last_affected":"7.51.0"},{"last_affected":"7.50.3"},{"last_affected":"7.50.2"},{"last_affected":"7.50.1"},{"last_affected":"7.50.0"},{"last_affected":"7.49.1"},{"last_affected":"7.49.0"},{"last_affected":"7.48.0"},{"last_affected":"7.47.1"},{"last_affected":"7.47.0"},{"last_affected":"7.46.0"},{"last_affected":"7.45.0"},{"last_affected":"7.44.0"},{"last_affected":"7.43.0"},{"last_affected":"7.42.1"},{"last_affected":"7.42.0"},{"last_affected":"7.41.0"}],"source":"AFFECTED_FIELD"}],"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/8xxx/CVE-2024-8096.json","cna_assigner":"curl"},"references":[{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2024/09/11/1"},{"type":"WEB","url":"https://curl.se/docs/CVE-2024-8096.html"},{"type":"WEB","url":"https://curl.se/docs/CVE-2024-8096.json"},{"type":"WEB","url":"https://hackerone.com/reports/2669852"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/11/msg00008.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/8xxx/CVE-2024-8096.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-8096"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20241011-0005/"}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"}]}