Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2015-3144

Опубликовано: 24 апр. 2015
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 9

Описание

The fix_hostname function in cURL and libcurl 7.37.0 through 7.41.0 does not properly calculate an index, which allows remote attackers to cause a denial of service (out-of-bounds read or write and crash) or possibly have other unspecified impact via a zero-length host name, as demonstrated by "http://:80" and ":80."

РелизСтатусПримечание
devel

released

7.38.0-3ubuntu3
esm-infra-legacy/trusty

not-affected

7.35.0-1ubuntu2.3
lucid

not-affected

precise

not-affected

trusty

not-affected

7.35.0-1ubuntu2.3
trusty/esm

not-affected

7.35.0-1ubuntu2.3
upstream

released

7.42.0
utopic

released

7.37.1-1ubuntu3.4
vivid

released

7.38.0-3ubuntu2.2
vivid/stable-phone-overlay

released

7.38.0-3ubuntu2.2

Показывать по

EPSS

Процентиль: 77%
0.01008
Низкий

9 Critical

CVSS2

Связанные уязвимости

redhat
почти 11 лет назад

The fix_hostname function in cURL and libcurl 7.37.0 through 7.41.0 does not properly calculate an index, which allows remote attackers to cause a denial of service (out-of-bounds read or write and crash) or possibly have other unspecified impact via a zero-length host name, as demonstrated by "http://:80" and ":80."

nvd
почти 11 лет назад

The fix_hostname function in cURL and libcurl 7.37.0 through 7.41.0 does not properly calculate an index, which allows remote attackers to cause a denial of service (out-of-bounds read or write and crash) or possibly have other unspecified impact via a zero-length host name, as demonstrated by "http://:80" and ":80."

debian
почти 11 лет назад

The fix_hostname function in cURL and libcurl 7.37.0 through 7.41.0 do ...

github
больше 3 лет назад

The fix_hostname function in cURL and libcurl 7.37.0 through 7.41.0 does not properly calculate an index, which allows remote attackers to cause a denial of service (out-of-bounds read or write and crash) or possibly have other unspecified impact via a zero-length host name, as demonstrated by "http://:80" and ":80."

suse-cvrf
почти 11 лет назад

Security update for curl

EPSS

Процентиль: 77%
0.01008
Низкий

9 Critical

CVSS2