ALT-PU-2018-2353-1
Closed vulnerabilities
BDU:2018-00916
Уязвимость программного средства для взаимодействия с серверами cURL, вызванная переполнением буфера в памяти, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2018-01424
Уязвимость программного средства для взаимодействия с серверами curl, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-00416
Уязвимость функции Curl_ntlm_core_mk_nt_hash программного средства для взаимодействия с серверами curl, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
Modified: 2024-11-21
CVE-2018-0500
Curl_smtp_escape_eob in lib/smtp.c in curl 7.54.1 to and including curl 7.60.0 has a heap-based buffer overflow that might be exploitable by an attacker who can control the data that curl transmits over SMTP with certain settings (i.e., use of a nonstandard --limit-rate argument or CURLOPT_BUFFERSIZE value).
- 1041280
- 1041280
- RHSA-2018:2486
- RHSA-2018:2486
- https://curl.haxx.se/docs/adv_2018-70a2.html
- https://curl.haxx.se/docs/adv_2018-70a2.html
- https://github.com/curl/curl/commit/ba1dbd78e5f1ed67c1b8d37ac89d90e5e330b628
- https://github.com/curl/curl/commit/ba1dbd78e5f1ed67c1b8d37ac89d90e5e330b628
- GLSA-201807-04
- GLSA-201807-04
- USN-3710-1
- USN-3710-1
Modified: 2024-11-21
CVE-2018-1000300
curl version curl 7.54.1 to and including curl 7.59.0 contains a CWE-122: Heap-based Buffer Overflow vulnerability in denial of service and more that can result in curl might overflow a heap based memory buffer when closing down an FTP connection with very long server command replies.. This vulnerability appears to have been fixed in curl < 7.54.1 and curl >= 7.60.0.
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- 104207
- 104207
- 1040933
- 1040933
- https://curl.haxx.se/docs/adv_2018-82c2.html
- https://curl.haxx.se/docs/adv_2018-82c2.html
- GLSA-201806-05
- GLSA-201806-05
- USN-3648-1
- USN-3648-1
- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
Modified: 2024-11-21
CVE-2018-1000301
curl version curl 7.20.0 to and including curl 7.59.0 contains a CWE-126: Buffer Over-read vulnerability in denial of service that can result in curl can be tricked into reading data beyond the end of a heap based buffer used to store downloaded RTSP content.. This vulnerability appears to have been fixed in curl < 7.20.0 and curl >= 7.60.0.
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- 104225
- 104225
- 1040931
- 1040931
- RHBA-2019:0327
- RHBA-2019:0327
- RHSA-2018:3157
- RHSA-2018:3157
- RHSA-2018:3558
- RHSA-2018:3558
- RHSA-2020:0544
- RHSA-2020:0544
- RHSA-2020:0594
- RHSA-2020:0594
- https://curl.haxx.se/docs/adv_2018-b138.html
- https://curl.haxx.se/docs/adv_2018-b138.html
- [debian-lts-announce] 20180516 [SECURITY] [DLA 1379-1] curl security update
- [debian-lts-announce] 20180516 [SECURITY] [DLA 1379-1] curl security update
- GLSA-201806-05
- GLSA-201806-05
- USN-3598-2
- USN-3598-2
- USN-3648-1
- USN-3648-1
- DSA-4202
- DSA-4202
- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
- https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
- https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
Modified: 2024-11-21
CVE-2018-14618
curl before version 7.61.1 is vulnerable to a buffer overrun in the NTLM authentication code. The internal function Curl_ntlm_core_mk_nt_hash multiplies the length of the password by two (SUM) to figure out how large temporary storage area to allocate from the heap. The length value is then subsequently used to iterate over the password and generate output into the allocated storage buffer. On systems with a 32 bit size_t, the math to calculate SUM triggers an integer overflow when the password length exceeds 2GB (2^31 bytes). This integer overflow usually causes a very small buffer to actually get allocated instead of the intended very huge one, making the use of that buffer end up in a heap buffer overflow. (This bug is almost identical to CVE-2017-8816.)
- 1041605
- RHSA-2018:3558
- RHSA-2019:1880
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14618
- https://cert-portal.siemens.com/productcert/pdf/ssa-436177.pdf
- https://curl.haxx.se/docs/CVE-2018-14618.html
- https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0014
- GLSA-201903-03
- USN-3765-1
- USN-3765-2
- DSA-4286
- 1041605
- DSA-4286
- USN-3765-2
- USN-3765-1
- GLSA-201903-03
- https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0014
- https://curl.haxx.se/docs/CVE-2018-14618.html
- https://cert-portal.siemens.com/productcert/pdf/ssa-436177.pdf
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14618
- RHSA-2019:1880
- RHSA-2018:3558