[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247862

 
 

909

 
 

194603

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS2-2018-995 --- curl, libcurl

ID: oval:org.secpod.oval:def:1700024Date: (C)2018-04-23   (M)2023-12-20
Class: PATCHFamily: unix




FTP path trickery leads to NIL byte out of bounds write:It was found that libcurl did not safely parse FTP URLs when using the CURLOPT_FTP_FILEMETHOD method. An attacker, able to provide a specially crafted FTP URL to an application using libcurl, could write a NULL byte at an arbitrary location, resulting in a crash, or an unspecified behavior. LDAP NULL pointer dereference:A NULL pointer dereference flaw was found in the way libcurl checks values returned by the openldap ldap_get_attribute_ber function. A malicious LDAP server could use this flaw to crash a libcurl client application via a specially crafted LDAP reply. RTSP RTP buffer over-read:A buffer over-read exists in curl 7.20.0 to and including curl 7.58.0 in the RTSP+RTP handling code that allows an attacker to cause a denial of service or information leakage

Platform:
Amazon Linux 2
Product:
curl
libcurl
Reference:
ALAS2-2018-995
CVE-2018-1000121
CVE-2018-1000120
CVE-2018-1000122
CVE    3
CVE-2018-1000121
CVE-2018-1000122
CVE-2018-1000120
CPE    2
cpe:/a:haxx:curl
cpe:/o:amazon:linux:2

© SecPod Technologies