First published: Mon Jul 02 2018(Updated: )
curl versions 7.54.1 through 7.60.0 are vulnerable to a heap-based buffer overflow in the Curl_smtp_escape_eob() function when uploading data over SMTP and using a reduced read buffer. An attacker could exploit this by convincing a user to use curl to upload data over SMTP with a reduced buffer to cause a crash or corrupt memory.
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/curl | <7.61.0 | 7.61.0 |
debian/curl | 7.74.0-1.3+deb11u13 7.74.0-1.3+deb11u11 7.88.1-10+deb12u7 7.88.1-10+deb12u5 8.9.1-2 8.10.0-2 | |
curl | >=7.54.1<=7.60.0 | |
Ubuntu Linux | =17.10 | |
Ubuntu Linux | =18.04 | |
Ubuntu | =17.10 | |
Ubuntu | =18.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-0500 is classified as a medium severity vulnerability due to the potential for exploitation via a heap-based buffer overflow.
To fix CVE-2018-0500, update curl to version 7.61.0 or later for Red Hat or version 7.74.0-1.3+deb11u13 or later for Debian.
CVE-2018-0500 affects curl versions from 7.54.1 up to 7.60.0 inclusive.
An attacker could exploit CVE-2018-0500 by convincing a victim to upload data over SMTP using a vulnerable version of curl with a reduced read buffer.
Exploitation of CVE-2018-0500 requires the victim to use curl with a reduced read buffer while uploading data over an SMTP server.