CVE-2012-0036

curl and libcurl 7.2x before 7.24.0 do not properly consider special characters during extraction of a pathname from a URL, which allows remote attackers to conduct data-injection attacks via a crafted URL, as demonstrated by a CRLF injection attack on the (1) IMAP, (2) POP3, or (3) SMTP protocol.
References
Link Resource
http://curl.haxx.se/curl-url-sanitize.patch Patch
http://curl.haxx.se/docs/adv_20120124.html Vendor Advisory
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
http://secunia.com/advisories/48256
http://security.gentoo.org/glsa/glsa-201203-02.xml
http://support.apple.com/kb/HT5281
http://www.debian.org/security/2012/dsa-2398
http://www.mandriva.com/security/advisories?name=MDVSA-2012:058
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.securityfocus.com/bid/51665
http://www.securitytracker.com/id/1032924
https://bugzilla.redhat.com/show_bug.cgi?id=773457
https://github.com/bagder/curl/commit/75ca568fa1c19de4c5358fed246686de8467c238
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03760en_us
http://curl.haxx.se/curl-url-sanitize.patch Patch
http://curl.haxx.se/docs/adv_20120124.html Vendor Advisory
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
http://secunia.com/advisories/48256
http://security.gentoo.org/glsa/glsa-201203-02.xml
http://support.apple.com/kb/HT5281
http://www.debian.org/security/2012/dsa-2398
http://www.mandriva.com/security/advisories?name=MDVSA-2012:058
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.securityfocus.com/bid/51665
http://www.securitytracker.com/id/1032924
https://bugzilla.redhat.com/show_bug.cgi?id=773457
https://github.com/bagder/curl/commit/75ca568fa1c19de4c5358fed246686de8467c238
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03760en_us
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:curl:curl:7.20.0:*:*:*:*:*:*:*
cpe:2.3:a:curl:curl:7.20.1:*:*:*:*:*:*:*
cpe:2.3:a:curl:curl:7.21.0:*:*:*:*:*:*:*
cpe:2.3:a:curl:curl:7.21.1:*:*:*:*:*:*:*
cpe:2.3:a:curl:curl:7.21.2:*:*:*:*:*:*:*
cpe:2.3:a:curl:curl:7.21.3:*:*:*:*:*:*:*
cpe:2.3:a:curl:curl:7.21.4:*:*:*:*:*:*:*
cpe:2.3:a:curl:curl:7.21.5:*:*:*:*:*:*:*
cpe:2.3:a:curl:curl:7.21.6:*:*:*:*:*:*:*
cpe:2.3:a:curl:curl:7.21.7:*:*:*:*:*:*:*
cpe:2.3:a:curl:curl:7.22.0:*:*:*:*:*:*:*
cpe:2.3:a:curl:curl:7.23.0:*:*:*:*:*:*:*
cpe:2.3:a:curl:curl:7.23.1:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:curl:libcurl:7.20.0:*:*:*:*:*:*:*
cpe:2.3:a:curl:libcurl:7.20.1:*:*:*:*:*:*:*
cpe:2.3:a:curl:libcurl:7.21.0:*:*:*:*:*:*:*
cpe:2.3:a:curl:libcurl:7.21.1:*:*:*:*:*:*:*
cpe:2.3:a:curl:libcurl:7.21.2:*:*:*:*:*:*:*
cpe:2.3:a:curl:libcurl:7.21.3:*:*:*:*:*:*:*
cpe:2.3:a:curl:libcurl:7.21.4:*:*:*:*:*:*:*
cpe:2.3:a:curl:libcurl:7.21.5:*:*:*:*:*:*:*
cpe:2.3:a:curl:libcurl:7.21.6:*:*:*:*:*:*:*
cpe:2.3:a:curl:libcurl:7.21.7:*:*:*:*:*:*:*
cpe:2.3:a:curl:libcurl:7.22.0:*:*:*:*:*:*:*
cpe:2.3:a:curl:libcurl:7.23.0:*:*:*:*:*:*:*
cpe:2.3:a:curl:libcurl:7.23.1:*:*:*:*:*:*:*

History

No history.

Information

Published : 2012-04-13 20:55

Updated : 2025-04-11 00:51


NVD link : CVE-2012-0036

Mitre link : CVE-2012-0036

CVE.ORG link : CVE-2012-0036


JSON object : View

Products Affected

curl

  • libcurl
  • curl
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')