Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-3144

Опубликовано: 24 апр. 2015
Источник: debian
EPSS Низкий

Описание

The fix_hostname function in cURL and libcurl 7.37.0 through 7.41.0 does not properly calculate an index, which allows remote attackers to cause a denial of service (out-of-bounds read or write and crash) or possibly have other unspecified impact via a zero-length host name, as demonstrated by "http://:80" and ":80."

Пакеты

ПакетСтатусВерсия исправленияРелизТип
curlfixed7.42.0-1package
curlfixed7.38.0-4+deb8u1jessiepackage
curlnot-affectedwheezypackage
curlnot-affectedsqueezepackage

Примечания

  • http://curl.haxx.se/docs/adv_20150422D.html

EPSS

Процентиль: 77%
0.01008
Низкий

Связанные уязвимости

ubuntu
почти 11 лет назад

The fix_hostname function in cURL and libcurl 7.37.0 through 7.41.0 does not properly calculate an index, which allows remote attackers to cause a denial of service (out-of-bounds read or write and crash) or possibly have other unspecified impact via a zero-length host name, as demonstrated by "http://:80" and ":80."

redhat
почти 11 лет назад

The fix_hostname function in cURL and libcurl 7.37.0 through 7.41.0 does not properly calculate an index, which allows remote attackers to cause a denial of service (out-of-bounds read or write and crash) or possibly have other unspecified impact via a zero-length host name, as demonstrated by "http://:80" and ":80."

nvd
почти 11 лет назад

The fix_hostname function in cURL and libcurl 7.37.0 through 7.41.0 does not properly calculate an index, which allows remote attackers to cause a denial of service (out-of-bounds read or write and crash) or possibly have other unspecified impact via a zero-length host name, as demonstrated by "http://:80" and ":80."

github
больше 3 лет назад

The fix_hostname function in cURL and libcurl 7.37.0 through 7.41.0 does not properly calculate an index, which allows remote attackers to cause a denial of service (out-of-bounds read or write and crash) or possibly have other unspecified impact via a zero-length host name, as demonstrated by "http://:80" and ":80."

suse-cvrf
почти 11 лет назад

Security update for curl

EPSS

Процентиль: 77%
0.01008
Низкий