Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2014-3707

Опубликовано: 05 нояб. 2014
Источник: redhat
CVSS2: 4

Описание

The curl_easy_duphandle function in libcurl 7.17.1 through 7.38.0, when running with the CURLOPT_COPYPOSTFIELDS option, does not properly copy HTTP POST data for an easy handle, which triggers an out-of-bounds read that allows remote web servers to read sensitive memory information.

A flaw was found in the way the libcurl library performed the duplication of connection handles. If an application set the CURLOPT_COPYPOSTFIELDS option for a handle, using the handle's duplicate could cause the application to crash or disclose a portion of its memory.

Отчет

This issue does not affect the versions of curl as shipped with Red Hat Enterprise Linux 5. Note that there are no applications provided with Red Hat Enterprise Linux that use the vulnerable CURLOPT_COPYPOSTFIELDS option, except PHP which could only be affected if used in an extremely unlikely scenario or via the script's author.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5curlNot affected
Red Hat Enterprise Virtualization 3mingw-virt-viewerFix deferred
Red Hat JBoss Enterprise Web Server 1inktank-1.2-curlWill not fix
Red Hat Enterprise Linux 6curlFixedRHSA-2015:125420.07.2015
Red Hat Enterprise Linux 7curlFixedRHSA-2015:215919.11.2015

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-125
Дефект:
CWE-416
https://bugzilla.redhat.com/show_bug.cgi?id=1154941curl: incorrect handle duplication after COPYPOSTFIELDS

4 Medium

CVSS2

Связанные уязвимости

ubuntu
почти 11 лет назад

The curl_easy_duphandle function in libcurl 7.17.1 through 7.38.0, when running with the CURLOPT_COPYPOSTFIELDS option, does not properly copy HTTP POST data for an easy handle, which triggers an out-of-bounds read that allows remote web servers to read sensitive memory information.

nvd
почти 11 лет назад

The curl_easy_duphandle function in libcurl 7.17.1 through 7.38.0, when running with the CURLOPT_COPYPOSTFIELDS option, does not properly copy HTTP POST data for an easy handle, which triggers an out-of-bounds read that allows remote web servers to read sensitive memory information.

debian
почти 11 лет назад

The curl_easy_duphandle function in libcurl 7.17.1 through 7.38.0, whe ...

github
больше 3 лет назад

The curl_easy_duphandle function in libcurl 7.17.1 through 7.38.0, when running with the CURLOPT_COPYPOSTFIELDS option, does not properly copy HTTP POST data for an easy handle, which triggers an out-of-bounds read that allows remote web servers to read sensitive memory information.

oracle-oval
почти 10 лет назад

ELSA-2015-2159: curl security, bug fix, and enhancement update (MODERATE)

4 Medium

CVSS2