Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-x89w-3fj3-7gmx

Опубликовано: 14 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The curl_easy_duphandle function in libcurl 7.17.1 through 7.38.0, when running with the CURLOPT_COPYPOSTFIELDS option, does not properly copy HTTP POST data for an easy handle, which triggers an out-of-bounds read that allows remote web servers to read sensitive memory information.

The curl_easy_duphandle function in libcurl 7.17.1 through 7.38.0, when running with the CURLOPT_COPYPOSTFIELDS option, does not properly copy HTTP POST data for an easy handle, which triggers an out-of-bounds read that allows remote web servers to read sensitive memory information.

EPSS

Процентиль: 51%
0.00277
Низкий

Дефекты

CWE-200

Связанные уязвимости

ubuntu
почти 11 лет назад

The curl_easy_duphandle function in libcurl 7.17.1 through 7.38.0, when running with the CURLOPT_COPYPOSTFIELDS option, does not properly copy HTTP POST data for an easy handle, which triggers an out-of-bounds read that allows remote web servers to read sensitive memory information.

redhat
почти 11 лет назад

The curl_easy_duphandle function in libcurl 7.17.1 through 7.38.0, when running with the CURLOPT_COPYPOSTFIELDS option, does not properly copy HTTP POST data for an easy handle, which triggers an out-of-bounds read that allows remote web servers to read sensitive memory information.

nvd
почти 11 лет назад

The curl_easy_duphandle function in libcurl 7.17.1 through 7.38.0, when running with the CURLOPT_COPYPOSTFIELDS option, does not properly copy HTTP POST data for an easy handle, which triggers an out-of-bounds read that allows remote web servers to read sensitive memory information.

debian
почти 11 лет назад

The curl_easy_duphandle function in libcurl 7.17.1 through 7.38.0, whe ...

oracle-oval
больше 9 лет назад

ELSA-2015-2159: curl security, bug fix, and enhancement update (MODERATE)

EPSS

Процентиль: 51%
0.00277
Низкий

Дефекты

CWE-200