Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-5436

Опубликовано: 28 мая 2019
Источник: debian
EPSS Средний

Описание

A heap buffer overflow in the TFTP receiving code allows for DoS or arbitrary code execution in libcurl versions 7.19.4 through 7.64.1.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
curlfixed7.64.0-4package
curlfixed7.52.1-5+deb9u10stretchpackage

Примечания

  • https://curl.haxx.se/docs/CVE-2019-5436.html

  • Introduced by: https://github.com/curl/curl/commit/0516ce7786e95

  • Fixed by: https://github.com/curl/curl/commit/2576003415625d7b5f0e390902f8097830b82275

EPSS

Процентиль: 96%
0.29542
Средний

Связанные уязвимости

CVSS3: 7.8
ubuntu
около 6 лет назад

A heap buffer overflow in the TFTP receiving code allows for DoS or arbitrary code execution in libcurl versions 7.19.4 through 7.64.1.

CVSS3: 7
redhat
около 6 лет назад

A heap buffer overflow in the TFTP receiving code allows for DoS or arbitrary code execution in libcurl versions 7.19.4 through 7.64.1.

CVSS3: 7.8
nvd
около 6 лет назад

A heap buffer overflow in the TFTP receiving code allows for DoS or arbitrary code execution in libcurl versions 7.19.4 through 7.64.1.

suse-cvrf
около 6 лет назад

Security update for curl

suse-cvrf
около 6 лет назад

Security update for curl

EPSS

Процентиль: 96%
0.29542
Средний