Lucene search

K
freebsdFreeBSDC8C31C41-49ED-11DF-83FB-0015587E2CC1
HistoryFeb 09, 2010 - 12:00 a.m.

curl -- libcurl buffer overflow vulnerability

2010-02-0900:00:00
vuxml.freebsd.org
19

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.044 Low

EPSS

Percentile

92.3%

The cURL project reports in a security advisory:

Using the affected libcurl version to download compressed
content over HTTP, an application can ask libcurl to
automatically uncompress data. When doing so, libcurl
can wrongly send data up to 64K in size to the callback
which thus is much larger than the documented maximum
size.
An application that blindly trusts libcurl’s max limit
for a fixed buffer size or similar is then a possible
target for a buffer overflow vulnerability.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchcurl= 7.10.5UNKNOWN
FreeBSDanynoarchcurl< 7.20.0UNKNOWN

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.044 Low

EPSS

Percentile

92.3%