CVE-2018-16839 log
Source |
|
Severity | High |
Remote | Yes |
Type | Arbitrary code execution |
Description | The internal function Curl_auth_create_plain_message fails to correctly verify that the passed in lengths for name and password aren't too long, then calculates a buffer size to allocate. On systems with a 32 bit size_t, the math to calculate the buffer size triggers an integer overflow when the user name length exceeds 2GB (2^31 bytes). This integer overflow usually causes a very small buffer to actually get allocated instead of the intended very huge one, making the use of that buffer end up in a heap buffer overflow. |
Group | Package | Affected | Fixed | Severity | Status | Ticket |
---|---|---|---|---|---|---|
AVG-798 | lib32-libcurl-gnutls | 7.61.1-1 | 7.62.0-1 | High | Fixed | |
AVG-797 | lib32-libcurl-compat | 7.61.1-1 | 7.62.0-1 | High | Fixed | |
AVG-796 | lib32-curl | 7.61.1-1 | 7.62.0-1 | High | Fixed |
Date | Advisory | Group | Package | Severity | Type |
---|---|---|---|---|---|
06 Nov 2018 | ASA-201811-9 | AVG-796 | lib32-curl | High | arbitrary code execution |
06 Nov 2018 | ASA-201811-8 | AVG-797 | lib32-libcurl-compat | High | arbitrary code execution |
06 Nov 2018 | ASA-201811-7 | AVG-798 | lib32-libcurl-gnutls | High | arbitrary code execution |
References |
---|
https://curl.haxx.se/docs/CVE-2018-16839.html https://github.com/curl/curl/commit/f3a24d7916b9173c69a3e0ee790102993833d6c5 |
Notes |
---|
32 bit only, not affected. |