First published: Fri Apr 24 2015(Updated: )
The sanitize_cookie_path function in cURL and libcurl 7.31.0 through 7.41.0 does not properly calculate an index, which allows remote attackers to cause a denial of service (out-of-bounds write and crash) or possibly have other unspecified impact via a cookie path containing only a double-quote character.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fedora | =21 | |
Fedora | =22 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =14.10 | |
Ubuntu | =15.04 | |
Debian | =7.0 | |
curl | =7.31.0 | |
curl | =7.32.0 | |
curl | =7.33.0 | |
curl | =7.34.0 | |
curl | =7.35.0 | |
curl | =7.36.0 | |
curl | =7.37.0 | |
curl | =7.37.1 | |
curl | =7.38.0 | |
curl | =7.39.0 | |
curl | =7.40.0 | |
curl | =7.41.0 | |
Apple iOS and macOS | =10.10.0 | |
Apple iOS and macOS | =10.10.1 | |
Apple iOS and macOS | =10.10.2 | |
Apple iOS and macOS | =10.10.3 | |
Apple iOS and macOS | =10.10.4 | |
Oracle Solaris and Zettabyte File System (ZFS) | =11.3 | |
curl | =7.30.0 | |
curl | =7.31.0 | |
curl | =7.32.0 | |
curl | =7.33.0 | |
curl | =7.34.0 | |
curl | =7.35.0 | |
curl | =7.36.0 | |
curl | =7.37.0 | |
curl | =7.37.1 | |
curl | =7.38.0 | |
curl | =7.39 | |
curl | =7.40.0 | |
curl | =7.41.0 | |
HP System Management Homepage | <=7.5.3.1 | |
SUSE Linux | =13.1 | |
SUSE Linux | =13.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-3145 is considered medium severity due to its potential to cause denial of service through out-of-bounds writes.
To mitigate CVE-2015-3145, update cURL or libcurl to version 7.42.0 or higher.
CVE-2015-3145 affects cURL and libcurl versions from 7.31.0 to 7.41.0.
CVEs 2015-3145 may allow attackers to conduct denial of service attacks by causing crashes through specific cookie paths.
CVE-2015-3145 affects various platforms including Fedora, Ubuntu, Debian, macOS, and Oracle Solaris.