Haxx

Libcurl

61 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 26.44%
  • Published 06.02.2019 20:29:00
  • Last modified 21.11.2024 04:42:36

libcurl versions from 7.36.0 to before 7.64.0 are vulnerable to a stack-based buffer overflow. The function creating an outgoing NTLM type-3 header (`lib/vauth/ntlm.c:Curl_auth_create_ntlm_type3_message()`), generates the request HTTP header contents...

  • EPSS 1.42%
  • Published 06.02.2019 20:29:00
  • Last modified 21.11.2024 03:53:32

libcurl versions from 7.36.0 to before 7.64.0 is vulnerable to a heap buffer out-of-bounds read. The function handling incoming NTLM type-2 messages (`lib/vauth/ntlm.c:ntlm_decode_type2_target`) does not validate incoming data correctly and is subjec...

  • EPSS 0.37%
  • Published 05.09.2018 19:29:00
  • Last modified 21.11.2024 03:49:26

curl before version 7.61.1 is vulnerable to a buffer overrun in the NTLM authentication code. The internal function Curl_ntlm_core_mk_nt_hash multiplies the length of the password by two (SUM) to figure out how large temporary storage area to allocat...

  • EPSS 1.56%
  • Published 31.07.2018 21:29:00
  • Last modified 21.11.2024 02:59:41

The URL percent-encoding decode function in libcurl before 7.51.0 is called `curl_easy_unescape`. Internally, even if this function would be made to allocate a unscape destination buffer larger than 2GB, it would return that new length in a signed 32...

  • EPSS 0.71%
  • Published 16.07.2018 13:29:00
  • Last modified 21.11.2024 03:31:57

In curl and libcurl 7.52.0 to and including 7.53.1, libcurl would attempt to resume a TLS session even if the client certificate had changed. That is unacceptable since a server by specification is allowed to skip the client certificate check on resu...

  • EPSS 0.34%
  • Published 24.01.2018 22:29:00
  • Last modified 21.11.2024 03:39:24

libcurl 7.49.0 to and including 7.57.0 contains an out bounds read in code handling HTTP/2 trailers. It was reported (https://github.com/curl/curl/pull/2231) that reading an HTTP/2 trailer could mess up future trailers since the stored size was one b...

  • EPSS 0.73%
  • Published 29.11.2017 18:29:00
  • Last modified 20.04.2025 01:37:25

curl and libcurl before 7.57.0 on 32-bit platforms allow attackers to cause a denial of service (out-of-bounds access and application crash) or possibly have unspecified other impact because too little memory is allocated for interfacing to an SSL li...

  • EPSS 1.28%
  • Published 29.11.2017 18:29:00
  • Last modified 20.04.2025 01:37:25

The FTP wildcard function in curl and libcurl before 7.57.0 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) or possibly have unspecified other impact via a string that ends with an '[' character.

  • EPSS 0.62%
  • Published 29.11.2017 18:29:00
  • Last modified 20.04.2025 01:37:25

The NTLM authentication feature in curl and libcurl before 7.57.0 on 32-bit platforms allows attackers to cause a denial of service (integer overflow and resultant buffer overflow, and application crash) or possibly have unspecified other impact via ...

  • EPSS 1.4%
  • Published 31.10.2017 21:29:00
  • Last modified 20.04.2025 01:37:25

An IMAP FETCH response line indicates the size of the returned data, in number of bytes. When that response says the data is zero bytes, libcurl would pass on that (non-existing) data with a pointer and the size (zero) to the deliver-data function. l...