First published: Wed Sep 11 2019(Updated: )
cURL libcurl is vulnerable to a heap-based buffer overflow, caused by improper bounds checking by the tftp_receive_packet function. By sending specially-crafted request containing an OACK without the BLKSIZE option, a remote attacker could overflow a buffer and execute arbitrary code on the system.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/curl | 7.64.0-4+deb10u2 7.64.0-4+deb10u7 7.74.0-1.3+deb11u9 7.74.0-1.3+deb11u10 7.88.1-10+deb12u3 7.88.1-10+deb12u4 8.4.0-2 | |
debian/curl | <=7.52.1-5+deb9u9<=7.52.1-1<=7.64.0-4<=7.65.3-1 | |
Haxx Curl | >=7.19.4<=7.65.3 | |
Fedoraproject Fedora | =29 | |
Fedoraproject Fedora | =30 | |
Fedoraproject Fedora | =31 | |
openSUSE Leap | =15.0 | |
openSUSE Leap | =15.1 | |
Netapp Cloud Backup | ||
NetApp OnCommand Insight | ||
Netapp Oncommand Unified Manager Windows | >=7.3 | |
Netapp Oncommand Unified Manager Vmware Vsphere | >=9.5 | |
NetApp OnCommand Workflow Automation | ||
Netapp Snapcenter | ||
Netapp Steelstore Cloud Integrated Storage | ||
Oracle Communications Operations Monitor | =3.4 | |
Oracle Communications Operations Monitor | =4.0 | |
Oracle Communications Operations Monitor | =4.1 | |
Oracle Communications Operations Monitor | =4.2 | |
Oracle Communications Operations Monitor | =4.3 | |
Oracle Communications Session Border Controller | =8.3 | |
Oracle Communications Session Border Controller | =8.4 | |
Oracle Enterprise Manager Ops Center | =12.3.3 | |
Oracle Enterprise Manager Ops Center | =12.4.0 | |
Oracle HTTP Server | =12.2.1.3.0 | |
Oracle HTTP Server | =12.2.1.4.0 | |
Oracle Hyperion Essbase | =11.1.2.4 | |
Oracle Mysql Server | >=5.0.0<=5.7.28 | |
Oracle Mysql Server | >=8.0.0<=8.0.18 | |
Oracle OSS Support Tools | =20.0 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
<=10.5 | ||
<=10.6 | ||
<=11.0 | ||
<=11.1 | ||
<=11.2 | ||
<=11.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2019-5482.
The title of the vulnerability is 'Heap buffer overflow in the TFTP protocol handler in cURL 7.19.4 to 7.65.3.'
The severity of CVE-2019-5482 is critical, with a severity value of 9.8.
The affected software includes cURL versions 7.19.4 to 7.65.3, IBM Security Guardium versions up to 11.3, Haxx Curl, and various other products and versions listed in the vulnerability description.
The recommended fix for CVE-2019-5482 is to update the affected software to the versions specified in the vulnerability description.