CVE-2019-3823 log
Source |
|
Severity | High |
Remote | Yes |
Type | Arbitrary code execution |
Description | libcurl versions from 7.34.0 to before 7.64.0 are vulnerable to a heap out-of-bounds read in the code handling the end-of-response for SMTP. If the buffer passed to `smtp_endofresp()` isn't NUL terminated and contains no character ending the parsed number, and `len` is set to 5, then the `strtol()` call reads beyond the allocated buffer. The read contents will not be returned to the caller. |
Group | Package | Affected | Fixed | Severity | Status | Ticket |
---|---|---|---|---|---|---|
AVG-877 | libcurl-gnutls | 7.63.0-2 | 7.64.0-1 | High | Fixed | |
AVG-876 | lib32-libcurl-gnutls | 7.63.0-2 | 7.64.0-1 | High | Fixed | |
AVG-875 | lib32-libcurl-compat | 7.63.0-2 | 7.64.0-1 | High | Fixed | |
AVG-874 | lib32-curl | 7.63.0-2 | 7.64.0-1 | High | Fixed | |
AVG-873 | curl | 7.63.0-4 | 7.64.0-1 | High | Fixed |
Date | Advisory | Group | Package | Severity | Type |
---|---|---|---|---|---|
12 Feb 2019 | ASA-201902-9 | AVG-873 | curl | High | arbitrary code execution |
12 Feb 2019 | ASA-201902-13 | AVG-874 | lib32-curl | High | arbitrary code execution |
12 Feb 2019 | ASA-201902-12 | AVG-875 | lib32-libcurl-compat | High | arbitrary code execution |
12 Feb 2019 | ASA-201902-11 | AVG-876 | lib32-libcurl-gnutls | High | arbitrary code execution |
12 Feb 2019 | ASA-201902-10 | AVG-877 | libcurl-gnutls | High | arbitrary code execution |
References |
---|
https://curl.haxx.se/docs/CVE-2019-3823.html https://github.com/curl/curl/commit/39df4073e5413fcdbb5a38da0c1ce6f1c0ceb484 |