First published: Wed May 15 2019(Updated: )
An integer overflow in curl's URL API results in a buffer overflow in libcurl 7.62.0 to and including 7.64.1.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/curl | <7.65.0 | 7.65.0 |
debian/curl | 7.64.0-4+deb10u2 7.64.0-4+deb10u7 7.74.0-1.3+deb11u9 7.74.0-1.3+deb11u10 7.88.1-10+deb12u3 7.88.1-10+deb12u4 8.4.0-2 | |
Haxx Curl | >=7.62.0<=7.64.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-5435 is an integer overflow vulnerability in curl's URL API that results in a buffer overflow in libcurl.
libcurl versions from 7.62.0 to 7.64.1 are affected by CVE-2019-5435.
CVE-2019-5435 has a severity level of medium, with a severity value of 3.7.
To fix CVE-2019-5435, upgrade your libcurl version to 7.65.0 or higher.
You can find more information about CVE-2019-5435 at the following references: [1] [2] [3]