9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.015 Low
EPSS
Percentile
86.9%
Issue Overview:
A heap use-after-free flaw was found in curl related to closing an easy handle. When closing and cleaning up an ‘easy’ handle in the Curl_close()
function, the library code first frees a struct (without nulling the pointer) and might then subsequently erroneously write to a struct field within that already freed struct. (CVE-2018-16840)
Curl is vulnerable to a buffer overrun in the SASL authentication code that may lead to denial of service. (CVE-2018-16839)
Curl is vulnerable to a heap-based buffer over-read in the tool_msgs.c:voutf() function that may result in information exposure and denial of service. (CVE-2018-16842)
Affected Packages:
curl
Issue Correction:
Run yum update curl to update your system.
New Packages:
i686:
libcurl-devel-7.53.1-16.86.amzn1.i686
libcurl-7.53.1-16.86.amzn1.i686
curl-7.53.1-16.86.amzn1.i686
curl-debuginfo-7.53.1-16.86.amzn1.i686
src:
curl-7.53.1-16.86.amzn1.src
x86_64:
libcurl-7.53.1-16.86.amzn1.x86_64
libcurl-devel-7.53.1-16.86.amzn1.x86_64
curl-7.53.1-16.86.amzn1.x86_64
curl-debuginfo-7.53.1-16.86.amzn1.x86_64
Red Hat: CVE-2018-16839, CVE-2018-16840, CVE-2018-16842
Mitre: CVE-2018-16839, CVE-2018-16840, CVE-2018-16842
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Amazon Linux | 1 | i686 | libcurl-devel | < 7.53.1-16.86.amzn1 | libcurl-devel-7.53.1-16.86.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | libcurl | < 7.53.1-16.86.amzn1 | libcurl-7.53.1-16.86.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | curl | < 7.53.1-16.86.amzn1 | curl-7.53.1-16.86.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | curl-debuginfo | < 7.53.1-16.86.amzn1 | curl-debuginfo-7.53.1-16.86.amzn1.i686.rpm |
Amazon Linux | 1 | x86_64 | libcurl | < 7.53.1-16.86.amzn1 | libcurl-7.53.1-16.86.amzn1.x86_64.rpm |
Amazon Linux | 1 | x86_64 | libcurl-devel | < 7.53.1-16.86.amzn1 | libcurl-devel-7.53.1-16.86.amzn1.x86_64.rpm |
Amazon Linux | 1 | x86_64 | curl | < 7.53.1-16.86.amzn1 | curl-7.53.1-16.86.amzn1.x86_64.rpm |
Amazon Linux | 1 | x86_64 | curl-debuginfo | < 7.53.1-16.86.amzn1 | curl-debuginfo-7.53.1-16.86.amzn1.x86_64.rpm |
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.015 Low
EPSS
Percentile
86.9%