First published: Thu Mar 08 2018(Updated: )
A buffer over-read exists in curl 7.20.0 to and including curl 7.58.0 in the RTSP+RTP handling code that allows an attacker to cause a denial of service or information leakage
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =17.10 | |
Haxx Curl | >=7.20.0<=7.58.0 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Workstation | =7.0 | |
Oracle Communications WebRTC Session Controller | <7.2 | |
Oracle Enterprise Manager Ops Center | =12.2.2 | |
Oracle Enterprise Manager Ops Center | =12.3.3 | |
Oracle PeopleSoft Enterprise PeopleTools | =8.55 | |
Oracle PeopleSoft Enterprise PeopleTools | =8.56 | |
Oracle PeopleSoft Enterprise PeopleTools | =8.57 | |
redhat/curl | <7.59.0 | 7.59.0 |
debian/curl | 7.74.0-1.3+deb11u13 7.74.0-1.3+deb11u14 7.88.1-10+deb12u8 7.88.1-10+deb12u5 8.11.0-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1000122 is a vulnerability in the RTSP+RTP handling code of curl versions 7.20.0 to 7.58.0 that can be exploited to cause a denial of service or information leakage.
CVE-2018-1000122 has a severity rating of 9.1, which is considered critical.
CVE-2018-1000122 affects curl versions 7.20.0 to 7.58.0.
To fix CVE-2018-1000122, update curl to version 7.59.0 or higher.
You can find more information about CVE-2018-1000122 at the following references: [link1](https://bugzilla.redhat.com/show_bug.cgi/attachment.cgi?id=1405982&action=diff), [link2](https://bugzilla.redhat.com/show_bug.cgi/attachment.cgi?id=1405982&action=edit), [link3](https://curl.haxx.se/docs/adv_2018-b047.html).