CVE-2015-3144

high
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

The fix_hostname function in cURL and libcurl 7.37.0 through 7.41.0 does not properly calculate an index, which allows remote attackers to cause a denial of service (out-of-bounds read or write and crash) or possibly have other unspecified impact via a zero-length host name, as demonstrated by "http://:80" and ":80."

References

http://curl.haxx.se/docs/adv_20150422D.html

http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743

http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html

http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155957.html

http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156945.html

http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157017.html

http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157188.html

http://lists.opensuse.org/opensuse-updates/2015-04/msg00057.html

http://www.debian.org/security/2015/dsa-3232

http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html

http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html

http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html

http://www.securityfocus.com/bid/74300

http://www.securitytracker.com/id/1032232

http://www.ubuntu.com/usn/USN-2591-1

https://security.gentoo.org/glsa/201509-02

https://support.apple.com/kb/HT205031

Details

Source: MITRE

Published: 2015-04-24

Updated: 2018-10-17

Type: CWE-119

Risk Information

CVSS v2

Base Score: 9

Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C

Impact Score: 10

Exploitability Score: 8

Severity: HIGH

Tenable Plugins

View all (15 total)

IDNameProductFamilySeverity
86662Slackware 13.0 / 13.1 / 13.37 / 14.0 / 14.1 / current : curl (SSA:2015-302-01)NessusSlackware Local Security Checks
high
86548MySQL Enterprise Monitor 2.3.x < 2.3.21 / 3.0.x < 3.0.23 Multiple VulnerabilitiesNessusCGI abuses
high
8981Mac OS X < 10.10.5 Multiple VulnerabilitiesNessus Network MonitorOperating System Detection
high
86133GLSA-201509-02 : cURL: Multiple vulnerabilitiesNessusGentoo Local Security Checks
high
8863cURL / libcURL 7.x < 7.42.0 Multiple VulnerabilitiesNessus Network MonitorWeb Clients
high
85408Mac OS X 10.10.x < 10.10.5 Multiple VulnerabilitiesNessusMacOS X Local Security Checks
high
83988SUSE SLED12 / SLES12 Security Update : curl (SUSE-SU-2015:0990-1)NessusSuSE Local Security Checks
high
83237Fedora 21 : mingw-curl-7.42.0-1.fc21 (2015-6853)NessusFedora Local Security Checks
high
83212Fedora 22 : mingw-curl-7.42.0-1.fc22 (2015-6864)NessusFedora Local Security Checks
high
83208Fedora 21 : curl-7.37.0-14.fc21 (2015-6728)NessusFedora Local Security Checks
high
83182Ubuntu 12.04 LTS / 14.04 LTS / 14.10 / 15.04 : curl vulnerabilities (USN-2591-1)NessusUbuntu Local Security Checks
high
83159openSUSE Security Update : curl (openSUSE-2015-336)NessusSuSE Local Security Checks
high
83078Fedora 22 : curl-7.40.0-3.fc22 (2015-6695)NessusFedora Local Security Checks
high
83057Amazon Linux AMI : curl (ALAS-2015-514)NessusAmazon Linux Local Security Checks
high
83003Debian DSA-3232-1 : curl - security updateNessusDebian Local Security Checks
high