CVE-2020-8285
Name
CVE-2020-8285
Description
curl 7.21.0 to and including 7.73.0 is vulnerable to uncontrolled recursion due to a stack overflow issue in FTP wildcard match parsing.
NVD Severity
medium
Other trackers
CVE
,
NVD
,
CERT
,
CVE Details
,
CIRCL
,
Arch Linux
,
Debian
,
Red Hat
,
Ubuntu
,
Gentoo
,
SUSE (Bugzilla)
,
SUSE (CVE)
,
Mageia
Mailing lists
oss-security
,
full-disclosure
,
bugtraq
Exploits
Exploit DB
,
Metasploit
Forges
GitHub (
code
,
issues
), Aports (
code
,
issues
)
References
Type
URI
Vendor Advisory
https://curl.se/docs/CVE-2020-8285.html
Permissions Required
https://hackerone.com/reports/1045844
Exploit
https://github.com/curl/curl/issues/6255
Mailing List
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG/
Mailing List
https://lists.debian.org/debian-lts-announce/2020/12/msg00029.html
Mailing List
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL/
Third Party Advisory
https://security.gentoo.org/glsa/202012-14
Third Party Advisory
https://security.netapp.com/advisory/ntap-20210122-0007/
Third Party Advisory
https://www.debian.org/security/2021/dsa-4881
Third Party Advisory
https://support.apple.com/kb/HT212325
Third Party Advisory
https://support.apple.com/kb/HT212326
Third Party Advisory
https://support.apple.com/kb/HT212327
FULLDISC
http://seclists.org/fulldisclosure/2021/Apr/51
MISC
https://www.oracle.com/security-alerts/cpuApr2021.html
MLIST
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
MLIST
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
N/A
https://www.oracle.com//security-alerts/cpujul2021.html
Patch
https://www.oracle.com/security-alerts/cpujan2022.html
Third Party Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
MISC
https://www.oracle.com/security-alerts/cpuapr2022.html
Match rules
CPE URI
Source package
Min version
Max version
cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*
libcurl
>= 7.21.0
< 7.74.0
Vulnerable and fixed packages
Source package
Branch
Version
Maintainer
Status