logo
DATABASE RESOURCES PRICING ABOUT US

Medium: curl

Description

**Issue Overview:** A heap-based buffer overflow has been found in the Curl_smtp_escape_eob() function of curl. An attacker could exploit this by convincing a user to use curl to upload data over SMTP with a reduced buffer to cause a crash or corrupt memory.(CVE-2018-0500) **Affected Packages:** curl **Issue Correction:** Run _yum update curl_ to update your system. **New Packages:** src:     curl-7.55.1-12.amzn2.0.5.src x86_64:     curl-7.55.1-12.amzn2.0.5.x86_64     libcurl-7.55.1-12.amzn2.0.5.x86_64     libcurl-devel-7.55.1-12.amzn2.0.5.x86_64     curl-debuginfo-7.55.1-12.amzn2.0.5.x86_64 ### Additional References Red Hat: [CVE-2018-0500](<https://access.redhat.com/security/cve/CVE-2018-0500>) Mitre: [CVE-2018-0500](<https://vulners.com/cve/CVE-2018-0500>)


Affected Package


OS OS Version Package Name Package Version
Amazon Linux 2 curl 7.55.1-12.amzn2.0.5
Amazon Linux 2 curl 7.55.1-12.amzn2.0.5
Amazon Linux 2 libcurl 7.55.1-12.amzn2.0.5
Amazon Linux 2 libcurl-devel 7.55.1-12.amzn2.0.5
Amazon Linux 2 curl-debuginfo 7.55.1-12.amzn2.0.5

Related