CVE-2018-1000301

Name
CVE-2018-1000301
Description
curl version curl 7.20.0 to and including curl 7.59.0 contains a CWE-126: Buffer Over-read vulnerability in denial of service that can result in curl can be tricked into reading data beyond the end of a heap based buffer used to store downloaded RTSP content.. This vulnerability appears to have been fixed in curl < 7.20.0 and curl >= 7.60.0.
NVD Severity
high
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Patch https://curl.haxx.se/docs/adv_2018-b138.html
Third Party Advisory https://www.debian.org/security/2018/dsa-4202
Third Party Advisory https://usn.ubuntu.com/3648-1/
Third Party Advisory https://usn.ubuntu.com/3598-2/
Mailing List https://lists.debian.org/debian-lts-announce/2018/05/msg00010.html
Third Party Advisory http://www.securitytracker.com/id/1040931
Third Party Advisory http://www.securityfocus.com/bid/104225
Patch http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
Patch http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
Third Party Advisory https://security.gentoo.org/glsa/201806-05
Third Party Advisory https://access.redhat.com/errata/RHSA-2018:3157
Third Party Advisory https://access.redhat.com/errata/RHSA-2018:3558
Patch https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
Third Party Advisory https://access.redhat.com/errata/RHBA-2019:0327
MISC https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
REDHAT https://access.redhat.com/errata/RHSA-2020:0544
REDHAT https://access.redhat.com/errata/RHSA-2020:0594

Match rules

CPE URI Source package Min version Max version
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* debian_linux == None == 8.0
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* debian_linux == None == 9.0
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:* debian_linux == None == 7.0

Vulnerable and fixed packages

Source package Branch Version Maintainer Status