Vulnerability CVE-2019-3823: Information
Description
libcurl versions from 7.34.0 to before 7.64.0 are vulnerable to a heap out-of-bounds read in the code handling the end-of-response for SMTP. If the buffer passed to `smtp_endofresp()` isn't NUL terminated and contains no character ending the parsed number, and `len` is set to 5, then the `strtol()` call reads beyond the allocated buffer. The read contents will not be returned to the caller.
Severity: HIGH (7.5) Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Fixed packages
Package name | Branch | Fixed in version | Version from repository | Errata ID | Task # | State |
---|---|---|---|---|---|---|
curl | sisyphus | 7.64.0-alt1 | 8.7.1-alt2 | ALT-PU-2019-1185-1 | 220787 | Fixed |
curl | p10 | 7.64.0-alt1 | 8.7.1-alt2 | ALT-PU-2019-1185-1 | 220787 | Fixed |
curl | p9 | 7.64.0-alt1 | 7.79.0-alt2 | ALT-PU-2019-1185-1 | 220787 | Fixed |
curl | p8 | 7.64.0-alt1 | 7.65.0-alt1 | ALT-PU-2019-1196-1 | 220788 | Fixed |
curl | c10f1 | 7.64.0-alt1 | 8.6.0-alt1 | ALT-PU-2019-1185-1 | 220787 | Fixed |
curl | c9f2 | 7.64.0-alt1 | 8.6.0-alt1 | ALT-PU-2019-1185-1 | 220787 | Fixed |
curl | p11 | 7.64.0-alt1 | 8.7.1-alt2 | ALT-PU-2019-1185-1 | 220787 | Fixed |
References to Advisories, Solutions, and Tools
Hyperlink | Resource |
---|---|
https://curl.haxx.se/docs/CVE-2019-3823.html |
|
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3823 |
|
DSA-4386 |
|
USN-3882-1 |
|
106950 |
|
GLSA-201903-03 |
|
https://security.netapp.com/advisory/ntap-20190315-0001/ |
|
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html |
|
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html | |
RHSA-2019:3701 | |
https://cert-portal.siemens.com/productcert/pdf/ssa-936080.pdf | |
[infra-devnull] 20190404 [GitHub] [incubator-openwhisk-runtime-ballerina] falkzoll commented on issue #15: Update to new base image jdk8u202-b08_openj9-0.12.1. |