[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2015-477 --- curl, libcurl

ID: oval:org.secpod.oval:def:1200050Date: (C)2015-12-28   (M)2023-12-18
Class: PATCHFamily: unix




The curl_easy_duphandle function in libcurl 7.17.1 through 7.38.0, when running with the CURLOPT_COPYPOSTFIELDS option, does not properly copy HTTP POST data for an easy handle, which triggers an out-of-bounds read that allows remote web servers to read sensitive memory information. CRLF injection vulnerability in libcurl 6.0 through 7.x before 7.40.0, when using an HTTP proxy, allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via CRLF sequences in a URL

Platform:
Amazon Linux AMI
Product:
curl
libcurl
Reference:
ALAS-2015-477
CVE-2014-3707
CVE-2014-8150
CVE    2
CVE-2014-3707
CVE-2014-8150
CPE    2
cpe:/o:amazon:linux
cpe:/a:haxx:curl

© SecPod Technologies