[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-4331-1 curl -- curl

ID: oval:org.secpod.oval:def:603567Date: (C)2018-11-20   (M)2023-12-20
Class: PATCHFamily: unix




Two vulnerabilities were discovered in cURL, an URL transfer library. CVE-2018-16839 Harry Sintonen discovered that, on systems with a 32 bit size_t, an integer overflow would be triggered when a SASL user name longer than 2GB is used. This would in turn cause a very small buffer to be allocated instead of the intended very huge one, which would trigger a heap buffer overflow when the buffer is used. CVE-2018-16842 Brian Carpenter discovered that the logic in the curl tool to wrap error messages at 80 columns is flawed, leading to a read buffer overflow if a single word in the message is itself longer than 80 bytes.

Platform:
Debian 9.x
Product:
libcurl4-gnutls-dev
libcurl4-doc
libcurl4-openssl-dev
libcurl3
curl
libcurl4-nss-dev
Reference:
DSA-4331-1
CVE-2018-16839
CVE-2018-16842
CVE    2
CVE-2018-16839
CVE-2018-16842
CPE    4
cpe:/o:debian:debian_linux:9.0
cpe:/a:haxx:curl
cpe:/o:debian:debian_linux:9.x
cpe:/o:debian:debian_linux:8.0
...

© SecPod Technologies