CVE-2015-3145

The sanitize_cookie_path function in cURL and libcurl 7.31.0 through 7.41.0 does not properly calculate an index, which allows remote attackers to cause a denial of service (out-of-bounds write and crash) or possibly have other unspecified impact via a cookie path containing only a double-quote character.
References
Link Resource
http://advisories.mageia.org/MGASA-2015-0179.html Third Party Advisory
http://curl.haxx.se/docs/adv_20150422C.html Vendor Advisory
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743
http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155957.html Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156250.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156945.html Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157017.html Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157188.html Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2015-04/msg00057.html Third Party Advisory
http://www.debian.org/security/2015/dsa-3232 Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2015:219 Third Party Advisory
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html Third Party Advisory
http://www.securityfocus.com/bid/74303
http://www.securitytracker.com/id/1032232 Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-2591-1 Third Party Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763 Third Party Advisory
https://security.gentoo.org/glsa/201509-02
https://support.apple.com/kb/HT205031 Third Party Advisory
http://advisories.mageia.org/MGASA-2015-0179.html Third Party Advisory
http://curl.haxx.se/docs/adv_20150422C.html Vendor Advisory
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743
http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155957.html Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156250.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156945.html Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157017.html Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157188.html Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2015-04/msg00057.html Third Party Advisory
http://www.debian.org/security/2015/dsa-3232 Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2015:219 Third Party Advisory
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html Third Party Advisory
http://www.securityfocus.com/bid/74303
http://www.securitytracker.com/id/1032232 Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-2591-1 Third Party Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763 Third Party Advisory
https://security.gentoo.org/glsa/201509-02
https://support.apple.com/kb/HT205031 Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:haxx:curl:7.31.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.32.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.33.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.34.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.35.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.36.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.37.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.37.1:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.38.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.39.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.40.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.41.0:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:apple:mac_os_x:10.10.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.10.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.10.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.10.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.10.4:*:*:*:*:*:*:*

Configuration 5 (hide)

cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*

Configuration 6 (hide)

OR cpe:2.3:a:haxx:libcurl:7.30.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:libcurl:7.37.1:*:*:*:*:*:*:*
cpe:2.3:a:haxx:libcurl:7.38.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:libcurl:7.39:*:*:*:*:*:*:*
cpe:2.3:a:haxx:libcurl:7.40.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:libcurl:7.41.0:*:*:*:*:*:*:*

Configuration 7 (hide)

cpe:2.3:a:hp:system_management_homepage:*:*:*:*:*:*:*:*

Configuration 8 (hide)

OR cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*

History

21 Nov 2024, 02:28

Type Values Removed Values Added
References () http://advisories.mageia.org/MGASA-2015-0179.html - Third Party Advisory () http://advisories.mageia.org/MGASA-2015-0179.html - Third Party Advisory
References () http://curl.haxx.se/docs/adv_20150422C.html - Vendor Advisory () http://curl.haxx.se/docs/adv_20150422C.html - Vendor Advisory
References () http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743 - () http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743 -
References () http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html - Third Party Advisory () http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html - Third Party Advisory
References () http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155957.html - Third Party Advisory () http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155957.html - Third Party Advisory
References () http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156250.html - () http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156250.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156945.html - Third Party Advisory () http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156945.html - Third Party Advisory
References () http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157017.html - Third Party Advisory () http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157017.html - Third Party Advisory
References () http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157188.html - Third Party Advisory () http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157188.html - Third Party Advisory
References () http://lists.opensuse.org/opensuse-updates/2015-04/msg00057.html - Third Party Advisory () http://lists.opensuse.org/opensuse-updates/2015-04/msg00057.html - Third Party Advisory
References () http://www.debian.org/security/2015/dsa-3232 - Third Party Advisory () http://www.debian.org/security/2015/dsa-3232 - Third Party Advisory
References () http://www.mandriva.com/security/advisories?name=MDVSA-2015:219 - Third Party Advisory () http://www.mandriva.com/security/advisories?name=MDVSA-2015:219 - Third Party Advisory
References () http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html - () http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -
References () http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html - Third Party Advisory () http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html - Third Party Advisory
References () http://www.securityfocus.com/bid/74303 - () http://www.securityfocus.com/bid/74303 -
References () http://www.securitytracker.com/id/1032232 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1032232 - Third Party Advisory, VDB Entry
References () http://www.ubuntu.com/usn/USN-2591-1 - Third Party Advisory () http://www.ubuntu.com/usn/USN-2591-1 - Third Party Advisory
References () https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763 - Third Party Advisory () https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763 - Third Party Advisory
References () https://security.gentoo.org/glsa/201509-02 - () https://security.gentoo.org/glsa/201509-02 -
References () https://support.apple.com/kb/HT205031 - Third Party Advisory () https://support.apple.com/kb/HT205031 - Third Party Advisory

Information

Published : 2015-04-24 14:59

Updated : 2024-11-21 02:28


NVD link : CVE-2015-3145

Mitre link : CVE-2015-3145

CVE.ORG link : CVE-2015-3145


JSON object : View

Products Affected

apple

  • mac_os_x

opensuse

  • opensuse

canonical

  • ubuntu_linux

haxx

  • curl
  • libcurl

debian

  • debian_linux

oracle

  • solaris

fedoraproject

  • fedora

hp

  • system_management_homepage
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer