First published: Wed Jul 11 2018(Updated: )
Peter Wu discovered that curl incorrectly handled certain SMTP buffers. A remote attacker could use this issue to cause curl to crash, resulting in a denial of service, or possibly execute arbitrary code.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/curl | <7.58.0-2ubuntu3.2 | 7.58.0-2ubuntu3.2 |
Ubuntu OpenSSH Client | =18.04 | |
All of | ||
ubuntu/libcurl3-gnutls | <7.58.0-2ubuntu3.2 | 7.58.0-2ubuntu3.2 |
Ubuntu OpenSSH Client | =18.04 | |
All of | ||
ubuntu/libcurl3-nss | <7.58.0-2ubuntu3.2 | 7.58.0-2ubuntu3.2 |
Ubuntu OpenSSH Client | =18.04 | |
All of | ||
ubuntu/libcurl4 | <7.58.0-2ubuntu3.2 | 7.58.0-2ubuntu3.2 |
Ubuntu OpenSSH Client | =18.04 | |
All of | ||
ubuntu/curl | <7.55.1-1ubuntu2.6 | 7.55.1-1ubuntu2.6 |
Ubuntu OpenSSH Client | =17.10 | |
All of | ||
ubuntu/libcurl3 | <7.55.1-1ubuntu2.6 | 7.55.1-1ubuntu2.6 |
Ubuntu OpenSSH Client | =17.10 | |
All of | ||
ubuntu/libcurl3-gnutls | <7.55.1-1ubuntu2.6 | 7.55.1-1ubuntu2.6 |
Ubuntu OpenSSH Client | =17.10 | |
All of | ||
ubuntu/libcurl3-nss | <7.55.1-1ubuntu2.6 | 7.55.1-1ubuntu2.6 |
Ubuntu OpenSSH Client | =17.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-3710-1 is considered critical due to the potential for denial of service and possible remote code execution.
To fix USN-3710-1, update curl to version 7.58.0-2ubuntu3.2 or 7.55.1-1ubuntu2.6 depending on your Ubuntu version.
USN-3710-1 affects curl and various associated libraries including libcurl3, libcurl3-gnutls, libcurl3-nss, and libcurl4 on Ubuntu 18.04 and 17.10.
Yes, USN-3710-1 can be leveraged by an attacker to cause curl to crash, resulting in a Denial of Service.
Yes, USN-3710-1 presents a vulnerability that may allow remote attackers to execute arbitrary code.