curl version curl 7.20.0 to and including curl 7.59.0 contains a CWE-126: Buffer Over-read vulnerability in denial of service that can result in curl can be tricked into reading data beyond the end of a heap based buffer used to store downloaded RTSP content.. This vulnerability appears to have been fixed in curl < 7.20.0 and curl >= 7.60.0.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
21 Nov 2024, 03:39
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html - Patch | |
References | () http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html - Patch | |
References | () http://www.securityfocus.com/bid/104225 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1040931 - Third Party Advisory, VDB Entry | |
References | () https://access.redhat.com/errata/RHBA-2019:0327 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2018:3157 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2018:3558 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2020:0544 - | |
References | () https://access.redhat.com/errata/RHSA-2020:0594 - | |
References | () https://curl.haxx.se/docs/adv_2018-b138.html - Patch, Vendor Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2018/05/msg00010.html - Mailing List, Third Party Advisory | |
References | () https://security.gentoo.org/glsa/201806-05 - Third Party Advisory | |
References | () https://usn.ubuntu.com/3598-2/ - Third Party Advisory | |
References | () https://usn.ubuntu.com/3648-1/ - Third Party Advisory | |
References | () https://www.debian.org/security/2018/dsa-4202 - Third Party Advisory | |
References | () https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html - Patch, Third Party Advisory | |
References | () https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html - |
Information
Published : 2018-05-24 13:29
Updated : 2024-11-21 03:39
NVD link : CVE-2018-1000301
Mitre link : CVE-2018-1000301
CVE.ORG link : CVE-2018-1000301
JSON object : View
Products Affected
redhat
- enterprise_linux_server
- enterprise_linux_desktop
- enterprise_linux_workstation
oracle
- enterprise_manager_ops_center
- peoplesoft_enterprise_peopletools
- communications_webrtc_session_controller
canonical
- ubuntu_linux
haxx
- curl
debian
- debian_linux
CWE
CWE-125
Out-of-bounds Read