First published: Mon Jul 02 2018(Updated: )
curl versions 7.54.1 through 7.60.0 are vulnerable to a heap-based buffer overflow in the Curl_smtp_escape_eob() function when uploading data over SMTP and using a reduced read buffer. An attacker could exploit this by convincing a user to use curl to upload data over SMTP with a reduced buffer to cause a crash or corrupt memory.
Credit: security@debian.org security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
Haxx Curl | >=7.54.1<=7.60.0 | |
Canonical Ubuntu Linux | =17.10 | |
Canonical Ubuntu Linux | =18.04 | |
redhat/curl | <7.61.0 | 7.61.0 |
debian/curl | 7.74.0-1.3+deb11u13 7.74.0-1.3+deb11u11 7.88.1-10+deb12u7 7.88.1-10+deb12u5 8.9.1-2 8.10.0-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.