Vulnerability identifier: #VU33020
Vulnerability risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-125
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
cURL
Client/Desktop applications /
Other client software
Vendor: curl.haxx.se
Description
The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.
The `curl_getdate` function in curl before version 7.51.0 is vulnerable to an out of bounds read if it receives an input with one digit short.
Mitigation
Install update from vendor's website.
Vulnerable software versions
cURL: 7.1 - 7.50.3
External links
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/94101
http://www.securitytracker.com/id/1037192
http://access.redhat.com/errata/RHSA-2018:2486
http://access.redhat.com/errata/RHSA-2018:3558
http://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8621
http://curl.haxx.se/CVE-2016-8621.patch
http://curl.haxx.se/docs/adv_20161102G.html
http://security.gentoo.org/glsa/201701-47
http://www.tenable.com/security/tns-2016-21
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.