libcurl versions from 7.34.0 to before 7.64.0 are vulnerable to a heap out-of-bounds read in the code handling the end-of-response for SMTP. If the buffer passed to `smtp_endofresp()` isn't NUL terminated and contains no character ending the parsed number, and `len` is set to 5, then the `strtol()` call reads beyond the allocated buffer. The read contents will not be returned to the caller.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
No history.
Information
Published : 2019-02-06 20:29
Updated : 2024-11-21 04:42
NVD link : CVE-2019-3823
Mitre link : CVE-2019-3823
CVE.ORG link : CVE-2019-3823
JSON object : View
Products Affected
debian
- debian_linux
oracle
- http_server
- communications_operations_monitor
- secure_global_desktop
netapp
- clustered_data_ontap
haxx
- libcurl
canonical
- ubuntu_linux
CWE
CWE-125
Out-of-bounds Read