First published: Sat Nov 15 2014(Updated: )
The curl_easy_duphandle function in libcurl 7.17.1 through 7.38.0, when running with the CURLOPT_COPYPOSTFIELDS option, does not properly copy HTTP POST data for an easy handle, which triggers an out-of-bounds read that allows remote web servers to read sensitive memory information.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu Linux | =10.04 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =14.10 | |
Apple iOS and macOS | =10.10.0 | |
Apple iOS and macOS | =10.10.1 | |
Apple iOS and macOS | =10.10.2 | |
Apple iOS and macOS | =10.10.3 | |
Apple iOS and macOS | =10.10.4 | |
openSUSE | =13.1 | |
openSUSE | =13.2 | |
Oracle Hyperion | =11.1.2.2 | |
Oracle Hyperion | =11.1.2.3 | |
Debian GNU/Linux | =7.0 | |
Debian GNU/Linux | =8.0 | |
libcurl | =7.17.1 | |
libcurl | =7.18.0 | |
libcurl | =7.18.1 | |
libcurl | =7.18.2 | |
libcurl | =7.19.0 | |
libcurl | =7.19.1 | |
libcurl | =7.19.2 | |
libcurl | =7.19.3 | |
libcurl | =7.19.4 | |
libcurl | =7.19.5 | |
libcurl | =7.19.6 | |
libcurl | =7.19.7 | |
libcurl | =7.20.0 | |
libcurl | =7.20.1 | |
libcurl | =7.21.0 | |
libcurl | =7.21.1 | |
libcurl | =7.21.2 | |
libcurl | =7.21.3 | |
libcurl | =7.21.4 | |
libcurl | =7.21.5 | |
libcurl | =7.21.6 | |
libcurl | =7.21.7 | |
libcurl | =7.22.0 | |
libcurl | =7.23.0 | |
libcurl | =7.23.1 | |
libcurl | =7.24.0 | |
libcurl | =7.25.0 | |
libcurl | =7.26.0 | |
libcurl | =7.27.0 | |
libcurl | =7.28.0 | |
libcurl | =7.28.1 | |
libcurl | =7.29.0 | |
libcurl | =7.30.0 | |
libcurl | =7.31.0 | |
libcurl | =7.32.0 | |
libcurl | =7.33.0 | |
libcurl | =7.34.0 | |
libcurl | =7.35.0 | |
libcurl | =7.36.0 | |
libcurl | =7.37.0 | |
libcurl | =7.37.1 | |
libcurl | =7.38.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3707 has been identified as a medium severity vulnerability due to its potential to expose sensitive memory information.
To fix CVE-2014-3707, users should upgrade to a version of libcurl newer than 7.38.0, where the vulnerability has been addressed.
CVE-2014-3707 affects libcurl versions from 7.17.1 to 7.38.0.
CVE-2014-3707 is an out-of-bounds read vulnerability that may allow remote web servers to access sensitive memory data.
CVE-2014-3707 impacts various systems including Ubuntu Linux, macOS Yosemite, openSUSE, and Oracle Hyperion running the affected versions of libcurl.