First published: Fri Apr 24 2015(Updated: )
The fix_hostname function in cURL and libcurl 7.37.0 through 7.41.0 does not properly calculate an index, which allows remote attackers to cause a denial of service (out-of-bounds read or write and crash) or possibly have other unspecified impact via a zero-length host name, as demonstrated by "http://:80" and ":80."
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
MySQL Enterprise Monitor | <=2.3.20 | |
MySQL Enterprise Monitor | <=3.0.22 | |
Curl | =7.37.0 | |
Curl | =7.37.1 | |
Curl | =7.38.0 | |
Curl | =7.39.0 | |
Curl | =7.40.0 | |
Curl | =7.41.0 | |
libcurl | =7.37.0 | |
libcurl | =7.37.1 | |
libcurl | =7.38.0 | |
libcurl | =7.39 | |
libcurl | =7.40.0 | |
libcurl | =7.41.0 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =14.10 | |
Ubuntu | =15.04 | |
Debian Linux | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-3144 has a CVSS score that indicates it is a medium severity vulnerability due to potential denial of service conditions.
To remediate CVE-2015-3144, update cURL to version 7.41.1 or later.
CVE-2015-3144 affects cURL and libcurl versions 7.37.0 to 7.41.0 as well as associated applications utilizing these libraries.
CVE-2015-3144 is classified as a denial of service vulnerability that may lead to out-of-bounds read or write issues.
While CVE-2015-3144 primarily leads to denial of service, its exploitation could potentially allow further unspecified impacts depending on the environment.