First published: Wed Mar 07 2018(Updated: )
A buffer overflow exists in curl 7.12.3 to and including curl 7.58.0 in the FTP URL handling that allows an attacker to cause a denial of service or worse.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/curl | <0:7.29.0-51.el7 | 0:7.29.0-51.el7 |
redhat/nss-pem | <0:1.0.3-5.el7 | 0:1.0.3-5.el7 |
redhat/curl | <0:7.29.0-42.el7_4.2 | 0:7.29.0-42.el7_4.2 |
redhat/curl | <0:7.29.0-46.el7_5.1 | 0:7.29.0-46.el7_5.1 |
redhat/httpd24-curl | <0:7.61.1-1.el6 | 0:7.61.1-1.el6 |
redhat/httpd24-httpd | <0:2.4.34-7.el6 | 0:2.4.34-7.el6 |
redhat/httpd24-nghttp2 | <0:1.7.1-7.el6 | 0:1.7.1-7.el6 |
redhat/httpd24-curl | <0:7.61.1-1.el7 | 0:7.61.1-1.el7 |
redhat/httpd24-httpd | <0:2.4.34-7.el7 | 0:2.4.34-7.el7 |
redhat/httpd24-nghttp2 | <0:1.7.1-7.el7 | 0:1.7.1-7.el7 |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =17.10 | |
Haxx Curl | >=7.12.3<=7.58.0 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Workstation | =7.0 | |
Oracle Communications WebRTC Session Controller | <7.2 | |
Oracle Enterprise Manager Ops Center | =12.2.2 | |
Oracle Enterprise Manager Ops Center | =12.3.3 | |
Oracle PeopleSoft Enterprise PeopleTools | =8.55 | |
Oracle PeopleSoft Enterprise PeopleTools | =8.56 | |
Oracle PeopleSoft Enterprise PeopleTools | =8.57 | |
redhat/curl | <7.59.0 | 7.59.0 |
debian/curl | 7.74.0-1.3+deb11u13 7.74.0-1.3+deb11u14 7.88.1-10+deb12u8 7.88.1-10+deb12u5 8.11.0-1 |
Preventing application from using non-default CURLOPT_FTP_FILEMETHOD will avoid triggering the vulnerable code.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The vulnerability ID is CVE-2018-1000120.
The severity of CVE-2018-1000120 is critical.
The affected software for CVE-2018-1000120 includes curl versions 7.12.3 to 7.58.0 and certain versions of debian, Ubuntu, Redhat, and Oracle products.
An attacker can exploit CVE-2018-1000120 by providing a specially crafted FTP URL to an application using libcurl, which can result in a crash or unspecified behavior.
Yes, the recommended fix for CVE-2018-1000120 is to upgrade to curl version 7.59.0 or higher.