CVE-2018-16839 log

Source
Severity High
Remote Yes
Type Arbitrary code execution
Description
The internal function Curl_auth_create_plain_message fails to correctly verify that the passed in lengths for name and password aren't too long, then calculates a buffer size to allocate. On systems with a 32 bit size_t, the math to calculate the buffer size triggers an integer overflow when the user name length exceeds 2GB (2^31 bytes). This integer overflow usually causes a very small buffer to actually get allocated instead of the intended very huge one, making the use of that buffer end up in a heap buffer overflow.
Group Package Affected Fixed Severity Status Ticket
AVG-798 lib32-libcurl-gnutls 7.61.1-1 7.62.0-1 High Fixed
AVG-797 lib32-libcurl-compat 7.61.1-1 7.62.0-1 High Fixed
AVG-796 lib32-curl 7.61.1-1 7.62.0-1 High Fixed
Date Advisory Group Package Severity Type
06 Nov 2018 ASA-201811-9 AVG-796 lib32-curl High arbitrary code execution
06 Nov 2018 ASA-201811-8 AVG-797 lib32-libcurl-compat High arbitrary code execution
06 Nov 2018 ASA-201811-7 AVG-798 lib32-libcurl-gnutls High arbitrary code execution
References
https://curl.haxx.se/docs/CVE-2018-16839.html
https://github.com/curl/curl/commit/f3a24d7916b9173c69a3e0ee790102993833d6c5
Notes
32 bit only, not affected.