Vulnerabilites related to The Curl Project - curl:
cve-2018-16839
Vulnerability from cvelistv5
Published
2018-10-31 18:00
Modified
2024-08-05 10:32
Severity ?
EPSS score ?
Summary
Curl versions 7.33.0 through 7.61.1 are vulnerable to a buffer overrun in the SASL authentication code that may lead to denial of service.
References
▼ | URL | Tags |
---|---|---|
https://security.gentoo.org/glsa/201903-03 | vendor-advisory, x_refsource_GENTOO | |
https://www.debian.org/security/2018/dsa-4331 | vendor-advisory, x_refsource_DEBIAN | |
https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html | mailing-list, x_refsource_MLIST | |
https://curl.haxx.se/docs/CVE-2018-16839.html | x_refsource_MISC | |
https://github.com/curl/curl/commit/f3a24d7916b9173c69a3e0ee790102993833d6c5 | x_refsource_CONFIRM | |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16839 | x_refsource_CONFIRM | |
http://www.securitytracker.com/id/1042012 | vdb-entry, x_refsource_SECTRACK | |
https://usn.ubuntu.com/3805-1/ | vendor-advisory, x_refsource_UBUNTU | |
https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f%40%3Cdevnull.infra.apache.org%3E | mailing-list, x_refsource_MLIST |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
The Curl Project | curl: |
Version: from 7.33.0 to 7.61.1 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T10:32:54.082Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "GLSA-201903-03", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201903-03", }, { name: "DSA-4331", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2018/dsa-4331", }, { name: "[debian-lts-announce] 20181106 [SECURITY] [DLA 1568-1] curl security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://curl.haxx.se/docs/CVE-2018-16839.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/curl/curl/commit/f3a24d7916b9173c69a3e0ee790102993833d6c5", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16839", }, { name: "1042012", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1042012", }, { name: "USN-3805-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3805-1/", }, { name: "[infra-devnull] 20190404 [GitHub] [incubator-openwhisk-runtime-ballerina] falkzoll commented on issue #15: Update to new base image jdk8u202-b08_openj9-0.12.1.", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f%40%3Cdevnull.infra.apache.org%3E", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "curl:", vendor: "The Curl Project", versions: [ { status: "affected", version: "from 7.33.0 to 7.61.1", }, ], }, ], datePublic: "2018-10-31T00:00:00", descriptions: [ { lang: "en", value: "Curl versions 7.33.0 through 7.61.1 are vulnerable to a buffer overrun in the SASL authentication code that may lead to denial of service.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-190", description: "CWE-190", lang: "en", type: "CWE", }, ], }, { descriptions: [ { cweId: "CWE-122", description: "CWE-122", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2019-04-04T16:06:05", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "GLSA-201903-03", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201903-03", }, { name: "DSA-4331", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2018/dsa-4331", }, { name: "[debian-lts-announce] 20181106 [SECURITY] [DLA 1568-1] curl security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html", }, { tags: [ "x_refsource_MISC", ], url: "https://curl.haxx.se/docs/CVE-2018-16839.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/curl/curl/commit/f3a24d7916b9173c69a3e0ee790102993833d6c5", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16839", }, { name: "1042012", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1042012", }, { name: "USN-3805-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3805-1/", }, { name: "[infra-devnull] 20190404 [GitHub] [incubator-openwhisk-runtime-ballerina] falkzoll commented on issue #15: Update to new base image jdk8u202-b08_openj9-0.12.1.", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f%40%3Cdevnull.infra.apache.org%3E", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2018-16839", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "curl:", version: { version_data: [ { version_value: "from 7.33.0 to 7.61.1", }, ], }, }, ], }, vendor_name: "The Curl Project", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Curl versions 7.33.0 through 7.61.1 are vulnerable to a buffer overrun in the SASL authentication code that may lead to denial of service.", }, ], }, impact: { cvss: [ [ { vectorString: "4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, ], ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-190", }, ], }, { description: [ { lang: "eng", value: "CWE-122", }, ], }, ], }, references: { reference_data: [ { name: "GLSA-201903-03", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201903-03", }, { name: "DSA-4331", refsource: "DEBIAN", url: "https://www.debian.org/security/2018/dsa-4331", }, { name: "[debian-lts-announce] 20181106 [SECURITY] [DLA 1568-1] curl security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html", }, { name: "https://curl.haxx.se/docs/CVE-2018-16839.html", refsource: "MISC", url: "https://curl.haxx.se/docs/CVE-2018-16839.html", }, { name: "https://github.com/curl/curl/commit/f3a24d7916b9173c69a3e0ee790102993833d6c5", refsource: "CONFIRM", url: "https://github.com/curl/curl/commit/f3a24d7916b9173c69a3e0ee790102993833d6c5", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16839", refsource: "CONFIRM", url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16839", }, { name: "1042012", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1042012", }, { name: "USN-3805-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3805-1/", }, { name: "[infra-devnull] 20190404 [GitHub] [incubator-openwhisk-runtime-ballerina] falkzoll commented on issue #15: Update to new base image jdk8u202-b08_openj9-0.12.1.", refsource: "MLIST", url: "https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f@%3Cdevnull.infra.apache.org%3E", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2018-16839", datePublished: "2018-10-31T18:00:00", dateReserved: "2018-09-11T00:00:00", dateUpdated: "2024-08-05T10:32:54.082Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-16842
Vulnerability from cvelistv5
Published
2018-10-31 19:00
Modified
2024-08-05 10:32
Severity ?
EPSS score ?
Summary
Curl versions 7.14.1 through 7.61.1 are vulnerable to a heap-based buffer over-read in the tool_msgs.c:voutf() function that may result in information exposure and denial of service.
References
▼ | URL | Tags |
---|---|---|
https://security.gentoo.org/glsa/201903-03 | vendor-advisory, x_refsource_GENTOO | |
https://www.debian.org/security/2018/dsa-4331 | vendor-advisory, x_refsource_DEBIAN | |
https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html | mailing-list, x_refsource_MLIST | |
https://curl.haxx.se/docs/CVE-2018-16842.html | x_refsource_MISC | |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16842 | x_refsource_CONFIRM | |
http://www.securitytracker.com/id/1042014 | vdb-entry, x_refsource_SECTRACK | |
https://github.com/curl/curl/commit/d530e92f59ae9bb2d47066c3c460b25d2ffeb211 | x_refsource_CONFIRM | |
https://usn.ubuntu.com/3805-2/ | vendor-advisory, x_refsource_UBUNTU | |
https://usn.ubuntu.com/3805-1/ | vendor-advisory, x_refsource_UBUNTU | |
https://access.redhat.com/errata/RHSA-2019:2181 | vendor-advisory, x_refsource_REDHAT | |
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
The Curl Project | curl: |
Version: from 7.14.1 to 7.61.1 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T10:32:54.082Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "GLSA-201903-03", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201903-03", }, { name: "DSA-4331", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2018/dsa-4331", }, { name: "[debian-lts-announce] 20181106 [SECURITY] [DLA 1568-1] curl security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://curl.haxx.se/docs/CVE-2018-16842.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16842", }, { name: "1042014", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1042014", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/curl/curl/commit/d530e92f59ae9bb2d47066c3c460b25d2ffeb211", }, { name: "USN-3805-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3805-2/", }, { name: "USN-3805-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3805-1/", }, { name: "RHSA-2019:2181", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2019:2181", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "curl:", vendor: "The Curl Project", versions: [ { status: "affected", version: "from 7.14.1 to 7.61.1", }, ], }, ], datePublic: "2018-10-31T00:00:00", descriptions: [ { lang: "en", value: "Curl versions 7.14.1 through 7.61.1 are vulnerable to a heap-based buffer over-read in the tool_msgs.c:voutf() function that may result in information exposure and denial of service.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "LOW", baseScore: 4.4, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-125", description: "CWE-125", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2019-10-16T17:40:48", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "GLSA-201903-03", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201903-03", }, { name: "DSA-4331", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2018/dsa-4331", }, { name: "[debian-lts-announce] 20181106 [SECURITY] [DLA 1568-1] curl security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html", }, { tags: [ "x_refsource_MISC", ], url: "https://curl.haxx.se/docs/CVE-2018-16842.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16842", }, { name: "1042014", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1042014", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/curl/curl/commit/d530e92f59ae9bb2d47066c3c460b25d2ffeb211", }, { name: "USN-3805-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3805-2/", }, { name: "USN-3805-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3805-1/", }, { name: "RHSA-2019:2181", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2019:2181", }, { tags: [ "x_refsource_MISC", ], url: "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2018-16842", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "curl:", version: { version_data: [ { version_value: "from 7.14.1 to 7.61.1", }, ], }, }, ], }, vendor_name: "The Curl Project", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Curl versions 7.14.1 through 7.61.1 are vulnerable to a heap-based buffer over-read in the tool_msgs.c:voutf() function that may result in information exposure and denial of service.", }, ], }, impact: { cvss: [ [ { vectorString: "4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L", version: "3.0", }, ], ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-125", }, ], }, ], }, references: { reference_data: [ { name: "GLSA-201903-03", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201903-03", }, { name: "DSA-4331", refsource: "DEBIAN", url: "https://www.debian.org/security/2018/dsa-4331", }, { name: "[debian-lts-announce] 20181106 [SECURITY] [DLA 1568-1] curl security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html", }, { name: "https://curl.haxx.se/docs/CVE-2018-16842.html", refsource: "MISC", url: "https://curl.haxx.se/docs/CVE-2018-16842.html", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16842", refsource: "CONFIRM", url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16842", }, { name: "1042014", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1042014", }, { name: "https://github.com/curl/curl/commit/d530e92f59ae9bb2d47066c3c460b25d2ffeb211", refsource: "CONFIRM", url: "https://github.com/curl/curl/commit/d530e92f59ae9bb2d47066c3c460b25d2ffeb211", }, { name: "USN-3805-2", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3805-2/", }, { name: "USN-3805-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3805-1/", }, { name: "RHSA-2019:2181", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2019:2181", }, { name: "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html", refsource: "MISC", url: "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2018-16842", datePublished: "2018-10-31T19:00:00", dateReserved: "2018-09-11T00:00:00", dateUpdated: "2024-08-05T10:32:54.082Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }