First published: Thu Jan 18 2018(Updated: )
An out-of-bounds read in code handling HTTP/2 trailers was found. This could lead to a denial-of-service or an information disclosure in some circumstances. Affected versions: libcurl 7.49.0 to and including 7.57.0 Not affected versions: libcurl < 7.49.0 and >= 7.58.0 Upstream bug report: <a href="https://github.com/curl/curl/pull/2231">https://github.com/curl/curl/pull/2231</a> Upstream patch: <a href="https://github.com/curl/curl/commit/fa3dbb9a147488a294.patch">https://github.com/curl/curl/commit/fa3dbb9a147488a294.patch</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Haxx Libcurl | >=7.49.0<=7.57.0 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =17.10 | |
redhat/curl | <7.58.0 | 7.58.0 |
debian/curl | 7.74.0-1.3+deb11u13 7.74.0-1.3+deb11u14 7.88.1-10+deb12u8 7.88.1-10+deb12u5 8.11.0-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-1000005 is critical with a value of 9.1.
CVE-2018-1000005 affects libcurl versions 7.49.0 to and including 7.57.0.
The remedy for CVE-2018-1000005 is to update libcurl to version 7.58.0 or higher.
More information about CVE-2018-1000005 can be found at the following references: [Github Pull Request](https://github.com/curl/curl/pull/2231), [Github Commit](https://github.com/curl/curl/commit/fa3dbb9a147488a294.patch), [Curl Advisory](https://curl.haxx.se/docs/adv_2018-824a.html).
The CWE for CVE-2018-1000005 is CWE-125 (Out-of-bounds Read).