FKIE_CVE-2010-0734
Vulnerability from fkie_nvd - Published: 2010-03-19 19:30 - Updated: 2025-04-11 00:51
Severity ?
Summary
content_encoding.c in libcurl 7.10.5 through 7.19.7, when zlib is enabled, does not properly restrict the amount of callback data sent to an application that requests automatic decompression, which might allow remote attackers to cause a denial of service (application crash) or have unspecified other impact by sending crafted compressed data to an application that relies on the intended data-length limit.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| curl | libcurl | 7.10.5 | |
| curl | libcurl | 7.10.6 | |
| curl | libcurl | 7.10.7 | |
| curl | libcurl | 7.10.8 | |
| curl | libcurl | 7.11.0 | |
| curl | libcurl | 7.11.1 | |
| curl | libcurl | 7.11.2 | |
| curl | libcurl | 7.12 | |
| curl | libcurl | 7.12.0 | |
| curl | libcurl | 7.12.1 | |
| curl | libcurl | 7.12.2 | |
| curl | libcurl | 7.12.3 | |
| curl | libcurl | 7.13 | |
| curl | libcurl | 7.13.1 | |
| curl | libcurl | 7.13.2 | |
| curl | libcurl | 7.14 | |
| curl | libcurl | 7.14.1 | |
| curl | libcurl | 7.15 | |
| curl | libcurl | 7.15.1 | |
| curl | libcurl | 7.15.2 | |
| curl | libcurl | 7.15.3 | |
| curl | libcurl | 7.16.3 | |
| curl | libcurl | 7.17.0 | |
| curl | libcurl | 7.17.1 | |
| curl | libcurl | 7.18.0 | |
| curl | libcurl | 7.18.1 | |
| curl | libcurl | 7.18.2 | |
| curl | libcurl | 7.19.0 | |
| curl | libcurl | 7.19.1 | |
| curl | libcurl | 7.19.2 | |
| curl | libcurl | 7.19.3 | |
| curl | libcurl | 7.19.4 | |
| curl | libcurl | 7.19.5 | |
| curl | libcurl | 7.19.6 | |
| curl | libcurl | 7.19.7 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:curl:libcurl:7.10.5:*:*:*:*:*:*:*",
"matchCriteriaId": "D703855E-6610-445D-B498-61CE1C763A9A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:curl:libcurl:7.10.6:*:*:*:*:*:*:*",
"matchCriteriaId": "AA7B64A2-6779-4A01-9864-902E2C04B08B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:curl:libcurl:7.10.7:*:*:*:*:*:*:*",
"matchCriteriaId": "A07B1635-6F28-4ED4-A2AC-CD7E9549C920",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:curl:libcurl:7.10.8:*:*:*:*:*:*:*",
"matchCriteriaId": "BFA4392F-2582-4EFE-9450-3F12588BE981",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:curl:libcurl:7.11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "53E91EAD-3813-498B-9B5C-05F1DCF75D3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:curl:libcurl:7.11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6CDDBC13-1646-490B-B778-DBD3BB3208C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:curl:libcurl:7.11.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6B87F05D-C077-4929-8BBA-A7287A816470",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:curl:libcurl:7.12:*:*:*:*:*:*:*",
"matchCriteriaId": "3DEC85E8-5555-46A9-9A95-30E1497AFA09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:curl:libcurl:7.12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8CA22553-089B-44D2-B545-82F7AED74E25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:curl:libcurl:7.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "03060364-7DCD-4111-BF7A-BEF6AFCB3134",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:curl:libcurl:7.12.2:*:*:*:*:*:*:*",
"matchCriteriaId": "319DADFB-081B-46AA-9F7D-DD4D1C5BE26D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:curl:libcurl:7.12.3:*:*:*:*:*:*:*",
"matchCriteriaId": "3D9C6906-5FBD-4736-87B6-720E288E394A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:curl:libcurl:7.13:*:*:*:*:*:*:*",
"matchCriteriaId": "4931FF86-51B6-470A-A2E0-A1B0942D1CF5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:curl:libcurl:7.13.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FA9DA33F-A33E-483E-AE4D-4422D62C02E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:curl:libcurl:7.13.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F5028DB2-87D5-4AD8-87D4-325C519D6CD9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:curl:libcurl:7.14:*:*:*:*:*:*:*",
"matchCriteriaId": "E992CDB0-A787-4F7E-AC55-13FE7C68A1D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:curl:libcurl:7.14.1:*:*:*:*:*:*:*",
"matchCriteriaId": "808143C5-108B-45BE-B626-A44F9F956018",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:curl:libcurl:7.15:*:*:*:*:*:*:*",
"matchCriteriaId": "8EBBB3F1-98BD-40D1-B09F-1924D567625A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:curl:libcurl:7.15.1:*:*:*:*:*:*:*",
"matchCriteriaId": "88D5DAE5-ABEA-4FF1-836C-BA4741F13323",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:curl:libcurl:7.15.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7E15191F-D4E6-425C-81BE-2CD55A815B5C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:curl:libcurl:7.15.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0407CCC0-ACAA-4B2A-99A5-DA57791057B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:curl:libcurl:7.16.3:*:*:*:*:*:*:*",
"matchCriteriaId": "248D86F7-A8E5-448D-A55A-C05278BB9822",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:curl:libcurl:7.17.0:*:*:*:*:*:*:*",
"matchCriteriaId": "295EE8FF-18BD-4F67-9045-83A5693AB783",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:curl:libcurl:7.17.1:*:*:*:*:*:*:*",
"matchCriteriaId": "249C50ED-B681-4DFB-83CD-625D703CD95F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:curl:libcurl:7.18.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F3F060A3-FC8E-45CD-85AB-247D13A2896C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:curl:libcurl:7.18.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F14BB81D-841D-456C-9CAE-CC679FFAB5E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:curl:libcurl:7.18.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6EBA081D-AB88-4895-8495-6B51EB6B5325",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:curl:libcurl:7.19.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F8F6B4C1-B88F-4675-BAB7-66A4DFAC17AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:curl:libcurl:7.19.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A44CE5AD-27B6-45EB-A0B8-CF9BDB31F0E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:curl:libcurl:7.19.2:*:*:*:*:*:*:*",
"matchCriteriaId": "63984E6B-54EF-4DD6-8A5B-DD16A9A6A4B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:curl:libcurl:7.19.3:*:*:*:*:*:*:*",
"matchCriteriaId": "EBACF741-C988-4800-A9FF-E4836A1EE4E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:curl:libcurl:7.19.4:*:*:*:*:*:*:*",
"matchCriteriaId": "95C5A868-2EC9-4FC6-A074-E587A203A350",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:curl:libcurl:7.19.5:*:*:*:*:*:*:*",
"matchCriteriaId": "54613E59-4583-405C-9BA3-609D47B9FFEB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:curl:libcurl:7.19.6:*:*:*:*:*:*:*",
"matchCriteriaId": "07436E22-446B-4041-B201-843FC2A9B9A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:curl:libcurl:7.19.7:*:*:*:*:*:*:*",
"matchCriteriaId": "59223E78-F55B-46BE-AD1B-176B441BC412",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "content_encoding.c in libcurl 7.10.5 through 7.19.7, when zlib is enabled, does not properly restrict the amount of callback data sent to an application that requests automatic decompression, which might allow remote attackers to cause a denial of service (application crash) or have unspecified other impact by sending crafted compressed data to an application that relies on the intended data-length limit."
},
{
"lang": "es",
"value": "content_encoding.c en libcurl v7.10.5 hasta v7.19.7, cuando zlib est\u00e1 habilitado, no restringe adecuadamente la cantidad de datos de llamadas devueltas, enviadas a una aplicaci\u00f3n que descomprime automaticamente las peticiones, lo que podr\u00eda permitir a un atacante remoto provocar una denegaci\u00f3n de servicio (ca\u00edda de aplicaci\u00f3n) o tener o tro impacto sin especificar mediante el env\u00edo de datos comprimidos manipulados a una aplicaci\u00f3n que se basa en el l\u00edmite destinado data-length."
}
],
"id": "CVE-2010-0734",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2010-03-19T19:30:00.577",
"references": [
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://curl.haxx.se/docs/adv_20100209.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://curl.haxx.se/docs/security.html#20100209"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch"
],
"url": "http://curl.haxx.se/libcurl-contentencoding.patch"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.apple.com/archives/security-announce/2010//Jun/msg00001.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-March/036744.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-March/037143.html"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/38843"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/38981"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/39087"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/39734"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/40220"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/45047"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/48256"
},
{
"source": "secalert@redhat.com",
"url": "http://security.gentoo.org/glsa/glsa-201203-02.xml"
},
{
"source": "secalert@redhat.com",
"url": "http://support.apple.com/kb/HT4188"
},
{
"source": "secalert@redhat.com",
"url": "http://support.avaya.com/css/P8/documents/100081819"
},
{
"source": "secalert@redhat.com",
"url": "http://wiki.rpath.com/Advisories:rPSA-2010-0072"
},
{
"source": "secalert@redhat.com",
"url": "http://www.debian.org/security/2010/dsa-2023"
},
{
"source": "secalert@redhat.com",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:062"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch"
],
"url": "http://www.openwall.com/lists/oss-security/2010/02/09/5"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch"
],
"url": "http://www.openwall.com/lists/oss-security/2010/03/09/1"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch"
],
"url": "http://www.openwall.com/lists/oss-security/2010/03/16/11"
},
{
"source": "secalert@redhat.com",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0329.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/archive/1/514490/100/0/threaded"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded"
},
{
"source": "secalert@redhat.com",
"url": "http://www.ubuntu.com/usn/USN-1158-1"
},
{
"source": "secalert@redhat.com",
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.vupen.com/english/advisories/2010/0571"
},
{
"source": "secalert@redhat.com",
"url": "http://www.vupen.com/english/advisories/2010/0602"
},
{
"source": "secalert@redhat.com",
"url": "http://www.vupen.com/english/advisories/2010/0660"
},
{
"source": "secalert@redhat.com",
"url": "http://www.vupen.com/english/advisories/2010/0725"
},
{
"source": "secalert@redhat.com",
"url": "http://www.vupen.com/english/advisories/2010/1481"
},
{
"source": "secalert@redhat.com",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=563220"
},
{
"source": "secalert@redhat.com",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10760"
},
{
"source": "secalert@redhat.com",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6756"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://curl.haxx.se/docs/adv_20100209.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://curl.haxx.se/docs/security.html#20100209"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://curl.haxx.se/libcurl-contentencoding.patch"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.apple.com/archives/security-announce/2010//Jun/msg00001.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-March/036744.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-March/037143.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/38843"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/38981"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/39087"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/39734"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/40220"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/45047"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/48256"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://security.gentoo.org/glsa/glsa-201203-02.xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://support.apple.com/kb/HT4188"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://support.avaya.com/css/P8/documents/100081819"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://wiki.rpath.com/Advisories:rPSA-2010-0072"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2010/dsa-2023"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:062"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.openwall.com/lists/oss-security/2010/02/09/5"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.openwall.com/lists/oss-security/2010/03/09/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.openwall.com/lists/oss-security/2010/03/16/11"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0329.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/514490/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.ubuntu.com/usn/USN-1158-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2010/0571"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2010/0602"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2010/0660"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2010/0725"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2010/1481"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=563220"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10760"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6756"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-264"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…