SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


Try our Premium Alert Service
 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service





Category:   Application (Generic)  >   curl Vendors:   curl.haxx.se
curl Buffer Overflow in Curl_auth_create_plain_message Lets Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1042012
SecurityTracker URL:  http://securitytracker.com/id/1042012
CVE Reference:   CVE-2018-16839   (Links to External Site)
Date:  Nov 1 2018
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in curl. A remote user can execute arbitrary code on the target system.

A remote user can send specially crafted SASL password data to trigger a buffer overflow in processing the Curl_auth_create_plain_message name and password and potentially execute arbitrary code on the target system.

The affected function can can be invoked using POP3(S), IMAP(S), or SMTP(S).

The issue is only present on 32-bit systems.

Harry Sintonen reported this vulnerability.

Impact:   A remote user can execute arbitrary code on the target system.
Solution:   The vendor has issued a fix (7.62.0).

The vendor advisory is available at:

https://curl.haxx.se/docs/CVE-2018-16839.html

Vendor URL:  curl.haxx.se/docs/CVE-2018-16839.html (Links to External Site)
Cause:   Boundary error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Nov 1 2018 (Ubuntu Issues Fix) curl Buffer Overflow in Curl_auth_create_plain_message Lets Remote Users Execute Arbitrary Code
Ubuntu has issued a fix for Ubuntu Linux 14.04 LTS, 16.04 LTS, 18.04 LTS, and 18.10.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2018, SecurityGlobal.net LLC