7.5

CVE-2020-8285

Exploit

curl 7.21.0 to and including 7.73.0 is vulnerable to uncontrolled recursion due to a stack overflow issue in FTP wildcard match parsing.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
HaxxLibcurl Version >= 7.21.0 < 7.74.0
DebianDebian Linux Version9.0
DebianDebian Linux Version10.0
FedoraprojectFedora Version32
FedoraprojectFedora Version33
NetappSolidfire Version-
NetappHci Bootstrap Os Version-
   NetappHci Compute Node Version-
NetappHci Storage Node Firmware Version-
   NetappHci Storage Node Version-
ApplemacOS X Version < 10.14.6
ApplemacOS X Version >= 10.15 < 10.15.7
ApplemacOS X Version10.14.6 Update-
ApplemacOS X Version10.14.6 Updatesecurity_update_2019-001
ApplemacOS X Version10.14.6 Updatesecurity_update_2019-002
ApplemacOS X Version10.14.6 Updatesecurity_update_2020-001
ApplemacOS X Version10.14.6 Updatesecurity_update_2020-002
ApplemacOS X Version10.14.6 Updatesecurity_update_2020-003
ApplemacOS X Version10.14.6 Updatesecurity_update_2020-004
ApplemacOS X Version10.14.6 Updatesecurity_update_2020-005
ApplemacOS X Version10.14.6 Updatesecurity_update_2020-006
ApplemacOS X Version10.14.6 Updatesecurity_update_2020-007
ApplemacOS X Version10.14.6 Updatesecurity_update_2021-001
ApplemacOS X Version10.15.7 Update-
ApplemacOS X Version10.15.7 Updatesecurity_update_2020-001
ApplemacOS X Version10.15.7 Updatesecurity_update_2021-001
ApplemacOS X Version10.15.7 Updatesupplemental_update
ApplemacOS Version >= 11.0 < 11.3
OracleEssbase Version21.2
FujitsuM10-1 Firmware Version < xcp2410
   FujitsuM10-1 Version-
FujitsuM10-4 Firmware Version < xcp2410
   FujitsuM10-4 Version-
FujitsuM10-4s Firmware Version < xcp2410
   FujitsuM10-4s Version-
FujitsuM12-1 Firmware Version < xcp2410
   FujitsuM12-1 Version-
FujitsuM12-2 Firmware Version < xcp2410
   FujitsuM12-2 Version-
FujitsuM12-2s Firmware Version < xcp2410
   FujitsuM12-2s Version-
FujitsuM10-1 Firmware Version < xcp3110
   FujitsuM10-1 Version-
FujitsuM10-4 Firmware Version < xcp3110
   FujitsuM10-4 Version-
FujitsuM10-4s Firmware Version < xcp3110
   FujitsuM10-4s Version-
FujitsuM12-1 Firmware Version < xcp3110
   FujitsuM12-1 Version-
FujitsuM12-2 Firmware Version < xcp3110
   FujitsuM12-2 Version-
FujitsuM12-2s Firmware Version < xcp3110
   FujitsuM12-2s Version-
SplunkUniversal Forwarder Version >= 8.2.0 < 8.2.12
SplunkUniversal Forwarder Version >= 9.0.0 < 9.0.6
SplunkUniversal Forwarder Version9.1.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.59% 0.683
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.5 3.9 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
nvd@nist.gov 5 10 2.9
AV:N/AC:L/Au:N/C:N/I:N/A:P
CWE-674 Uncontrolled Recursion

The product does not properly control the amount of recursion that takes place, consuming excessive resources, such as allocated memory or the program stack.

CWE-787 Out-of-bounds Write

The product writes data past the end, or before the beginning, of the intended buffer.

http://seclists.org/fulldisclosure/2021/Apr/51
Third Party Advisory
Mailing List
https://github.com/curl/curl/issues/6255
Third Party Advisory
Exploit