Описание
curl before version 7.52.0 is vulnerable to a buffer overflow when doing a large floating point output in libcurl's implementation of the printf() functions. If there are any application that accepts a format string from the outside without necessary input filtering, it could allow remote attacks.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| .NET Core 1.0 on Red Hat Enterprise Linux | rh-dotnetcore10-curl | Out of support scope | ||
| .NET Core 1.1 on Red Hat Enterprise Linux | rh-dotnetcore11-curl | Out of support scope | ||
| .NET Core 2.0 on Red Hat Enterprise Linux | rh-dotnet20-curl | Out of support scope | ||
| .NET Core 2.1 on Red Hat Enterprise Linux | rh-dotnet21-curl | Will not fix | ||
| Red Hat Enterprise Linux 5 | curl | Will not fix | ||
| Red Hat Enterprise Linux 6 | curl | Will not fix | ||
| Red Hat Enterprise Linux 7 | curl | Will not fix | ||
| Red Hat Enterprise Virtualization 3 | mingw-virt-viewer | Will not fix | ||
| Red Hat JBoss Enterprise Web Server 3 | curl | Not affected | ||
| Red Hat Software Collections for Red Hat Enterprise Linux 6 | httpd24-curl | Fixed | RHSA-2018:3558 | 13.11.2018 |
Показывать по
Дополнительная информация
Статус:
EPSS
5.9 Medium
CVSS3
2.6 Low
CVSS2
Связанные уязвимости
curl before version 7.52.0 is vulnerable to a buffer overflow when doing a large floating point output in libcurl's implementation of the printf() functions. If there are any application that accepts a format string from the outside without necessary input filtering, it could allow remote attacks.
curl before version 7.52.0 is vulnerable to a buffer overflow when doing a large floating point output in libcurl's implementation of the printf() functions. If there are any application that accepts a format string from the outside without necessary input filtering, it could allow remote attacks.
curl before version 7.52.0 is vulnerable to a buffer overflow when doi ...
curl before version 7.52.0 is vulnerable to a buffer overflow when doing a large floating point output in libcurl's implementation of the printf() functions. If there are any application that accepts a format string from the outside without necessary input filtering, it could allow remote attacks.
EPSS
5.9 Medium
CVSS3
2.6 Low
CVSS2