← Voltar para CVEs
CVE-2019-3823
N/ADescricao
libcurl versions from 7.34.0 to before 7.64.0 are vulnerable to a heap out-of-bounds read in the code handling the end-of-response for SMTP. If the buffer passed to `smtp_endofresp()` isn't NUL terminated and contains no character ending the parsed number, and `len` is set to 5, then the `strtol()` call reads beyond the allocated buffer. The read contents will not be returned to the caller.
Detalhes CVE
Pontuacao CVSS v3.1N/A
Publicado2/6/2019
Ultima modificacao11/21/2024
Fontenvd
Avistamentos honeypot0
Produtos afetados
canonical:ubuntu_linuxdebian:debian_linuxhaxx:libcurlnetapp:clustered_data_ontaporacle:communications_operations_monitororacle:http_serveroracle:secure_global_desktop
Fraquezas (CWE)
CWE-125CWE-125
Referencias
http://www.securityfocus.com/bid/106950(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2019:3701(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3823(secalert@redhat.com)
https://cert-portal.siemens.com/productcert/pdf/ssa-936080.pdf(secalert@redhat.com)
https://curl.haxx.se/docs/CVE-2019-3823.html(secalert@redhat.com)
https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f%40%3Cdevnull.infra.apache.org%3E(secalert@redhat.com)
https://security.gentoo.org/glsa/201903-03(secalert@redhat.com)
https://security.netapp.com/advisory/ntap-20190315-0001/(secalert@redhat.com)
https://usn.ubuntu.com/3882-1/(secalert@redhat.com)
https://www.debian.org/security/2019/dsa-4386(secalert@redhat.com)
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html(secalert@redhat.com)
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html(secalert@redhat.com)
http://www.securityfocus.com/bid/106950(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:3701(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3823(af854a3a-2127-422b-91ae-364da2661108)
https://cert-portal.siemens.com/productcert/pdf/ssa-936080.pdf(af854a3a-2127-422b-91ae-364da2661108)
https://curl.haxx.se/docs/CVE-2019-3823.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f%40%3Cdevnull.infra.apache.org%3E(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/201903-03(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20190315-0001/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3882-1/(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2019/dsa-4386(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html(af854a3a-2127-422b-91ae-364da2661108)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.