CVE-2019-3822
- EPSS 26.44%
- Veröffentlicht 06.02.2019 20:29:00
- Zuletzt bearbeitet 21.11.2024 04:42:36
libcurl versions from 7.36.0 to before 7.64.0 are vulnerable to a stack-based buffer overflow. The function creating an outgoing NTLM type-3 header (`lib/vauth/ntlm.c:Curl_auth_create_ntlm_type3_message()`), generates the request HTTP header contents...
CVE-2018-16890
- EPSS 1.42%
- Veröffentlicht 06.02.2019 20:29:00
- Zuletzt bearbeitet 21.11.2024 03:53:32
libcurl versions from 7.36.0 to before 7.64.0 is vulnerable to a heap buffer out-of-bounds read. The function handling incoming NTLM type-2 messages (`lib/vauth/ntlm.c:ntlm_decode_type2_target`) does not validate incoming data correctly and is subjec...
- EPSS 0.37%
- Veröffentlicht 05.09.2018 19:29:00
- Zuletzt bearbeitet 21.11.2024 03:49:26
curl before version 7.61.1 is vulnerable to a buffer overrun in the NTLM authentication code. The internal function Curl_ntlm_core_mk_nt_hash multiplies the length of the password by two (SUM) to figure out how large temporary storage area to allocat...
CVE-2016-8622
- EPSS 1.56%
- Veröffentlicht 31.07.2018 21:29:00
- Zuletzt bearbeitet 21.11.2024 02:59:41
The URL percent-encoding decode function in libcurl before 7.51.0 is called `curl_easy_unescape`. Internally, even if this function would be made to allocate a unscape destination buffer larger than 2GB, it would return that new length in a signed 32...
CVE-2017-7468
- EPSS 0.71%
- Veröffentlicht 16.07.2018 13:29:00
- Zuletzt bearbeitet 21.11.2024 03:31:57
In curl and libcurl 7.52.0 to and including 7.53.1, libcurl would attempt to resume a TLS session even if the client certificate had changed. That is unacceptable since a server by specification is allowed to skip the client certificate check on resu...
CVE-2018-1000005
- EPSS 0.34%
- Veröffentlicht 24.01.2018 22:29:00
- Zuletzt bearbeitet 21.11.2024 03:39:24
libcurl 7.49.0 to and including 7.57.0 contains an out bounds read in code handling HTTP/2 trailers. It was reported (https://github.com/curl/curl/pull/2231) that reading an HTTP/2 trailer could mess up future trailers since the stored size was one b...
CVE-2017-8818
- EPSS 0.73%
- Veröffentlicht 29.11.2017 18:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
curl and libcurl before 7.57.0 on 32-bit platforms allow attackers to cause a denial of service (out-of-bounds access and application crash) or possibly have unspecified other impact because too little memory is allocated for interfacing to an SSL li...
CVE-2017-8817
- EPSS 1.28%
- Veröffentlicht 29.11.2017 18:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
The FTP wildcard function in curl and libcurl before 7.57.0 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) or possibly have unspecified other impact via a string that ends with an '[' character.
CVE-2017-8816
- EPSS 0.62%
- Veröffentlicht 29.11.2017 18:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
The NTLM authentication feature in curl and libcurl before 7.57.0 on 32-bit platforms allows attackers to cause a denial of service (integer overflow and resultant buffer overflow, and application crash) or possibly have unspecified other impact via ...
CVE-2017-1000257
- EPSS 1.4%
- Veröffentlicht 31.10.2017 21:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
An IMAP FETCH response line indicates the size of the returned data, in number of bytes. When that response says the data is zero bytes, libcurl would pass on that (non-existing) data with a pointer and the size (zero) to the deliver-data function. l...