CVE-2018-1000301
Summary
| CVE | CVE-2018-1000301 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2018-05-24 13:29:00 UTC |
| Updated | 2019-10-03 00:03:00 UTC |
| Description | curl version curl 7.20.0 to and including curl 7.59.0 contains a CWE-126: Buffer Over-read vulnerability in denial of service that can result in curl can be tricked into reading data beyond the end of a heap based buffer used to store downloaded RTSP content.. This vulnerability appears to have been fixed in curl < 7.20.0 and curl >= 7.60.0. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| curl - RTSP bad headers buffer over-read - CVE-2018-1000301 |
CONFIRM |
curl.haxx.se |
Patch, Vendor Advisory |
| Red Hat Customer Portal |
REDHAT |
access.redhat.com |
Third Party Advisory |
| CPU July 2018 |
CONFIRM |
www.oracle.com |
Patch |
| Oracle Critical Patch Update - January 2019 |
CONFIRM |
www.oracle.com |
Patch, Third Party Advisory |
| Oracle Critical Patch Update - July 2019 |
MISC |
www.oracle.com |
|
| cURL CVE-2018-1000301 Information Disclosure Vulnerability |
BID |
www.securityfocus.com |
Third Party Advisory, VDB Entry |
| curl RTSP Response Processing Flaw in Curl_http_readwrite_headers() Lets Remote Users Deny Service or Obtain Potentially Sensitive Information - SecurityTracker |
SECTRACK |
www.securitytracker.com |
Third Party Advisory, VDB Entry |
| Red Hat Customer Portal |
REDHAT |
access.redhat.com |
Third Party Advisory |
| Red Hat Customer Portal |
REDHAT |
access.redhat.com |
|
| USN-3648-1: curl vulnerabilities | Ubuntu security notices |
UBUNTU |
usn.ubuntu.com |
Third Party Advisory |
| USN-3598-2: curl vulnerabilities | Ubuntu security notices |
UBUNTU |
usn.ubuntu.com |
Third Party Advisory |
| CPU Oct 2018 |
CONFIRM |
www.oracle.com |
Patch |
| Red Hat Customer Portal |
REDHAT |
access.redhat.com |
Third Party Advisory |
| Debian -- Security Information -- DSA-4202-1 curl |
DEBIAN |
www.debian.org |
Third Party Advisory |
| [SECURITY] [DLA 1379-1] curl security update |
MLIST |
lists.debian.org |
Mailing List, Third Party Advisory |
| cURL: Multiple vulnerabilities (GLSA 201806-05) — Gentoo Security |
GENTOO |
security.gentoo.org |
Third Party Advisory |
| Red Hat Customer Portal |
REDHAT |
access.redhat.com |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 500123 Alpine Linux Security Update for curl
- 503778 Alpine Linux Security Update for curl
- 690572 Free Berkeley Software Distribution (FreeBSD) Security Update for curl (04fe6c8d-2a34-4009-a81e-e7a7e759b5d2)
- 710308 Gentoo Linux cURL Multiple Vulnerabilities (GLSA 201806-05)