CVE-2019-3823

high
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

libcurl versions from 7.34.0 to before 7.64.0 are vulnerable to a heap out-of-bounds read in the code handling the end-of-response for SMTP. If the buffer passed to `smtp_endofresp()` isn't NUL terminated and contains no character ending the parsed number, and `len` is set to 5, then the `strtol()` call reads beyond the allocated buffer. The read contents will not be returned to the caller.

References

http://www.securityfocus.com/bid/106950

https://access.redhat.com/errata/RHSA-2019:3701

https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3823

https://cert-portal.siemens.com/productcert/pdf/ssa-936080.pdf

https://curl.haxx.se/docs/CVE-2019-3823.html

https://lists.apache.org/thread.html/[email protected]%3Cdevnull.infra.apache.org%3E

https://security.gentoo.org/glsa/201903-03

https://security.netapp.com/advisory/ntap-20190315-0001/

https://usn.ubuntu.com/3882-1/

https://www.debian.org/security/2019/dsa-4386

https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html

https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html

Details

Source: MITRE

Published: 2019-02-06

Updated: 2021-03-09

Type: CWE-125

Risk Information

CVSS v2

Base Score: 5

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 10

Severity: MEDIUM

CVSS v3

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Impact Score: 3.6

Exploitability Score: 3.9

Severity: HIGH

Tenable Plugins

View all (18 total)

IDNameProductFamilySeverity
145603CentOS 8 : curl (CESA-2019:3701)NessusCentOS Local Security Checks
critical
133296Photon OS 1.0: Curl PHSA-2019-1.0-0209NessusPhotonOS Local Security Checks
critical
130568RHEL 8 : curl (RHSA-2019:3701)NessusRed Hat Local Security Checks
critical
126783MySQL 5.7.x < 5.7.27 Multiple Vulnerabilities (Jul 2019 CPU)NessusDatabases
critical
124160MySQL 8.0.x < 8.0.16 Multiple Vulnerabilities (Apr 2019 CPU) (Jul 2019 CPU)NessusDatabases
critical
122910Photon OS 2.0: Curl PHSA-2019-2.0-0131NessusPhotonOS Local Security Checks
high
122731GLSA-201903-03 : cURL: Multiple vulnerabilitiesNessusGentoo Local Security Checks
critical
122260Amazon Linux 2 : curl (ALAS-2019-1162)NessusAmazon Linux Local Security Checks
critical
122221openSUSE Security Update : curl (openSUSE-2019-174)NessusSuSE Local Security Checks
critical
122220openSUSE Security Update : curl (openSUSE-2019-173)NessusSuSE Local Security Checks
critical
122149SUSE SLED12 / SLES12 Security Update : curl (SUSE-SU-2019:0339-1)NessusSuSE Local Security Checks
critical
122106Fedora 29 : curl (2019-43489941ff)NessusFedora Local Security Checks
critical
122042FreeBSD : curl -- multiple vulnerabilities (714b033a-2b09-11e9-8bc3-610fd6e6cd05)NessusFreeBSD Local Security Checks
critical
121639Ubuntu 14.04 LTS / 16.04 LTS / 18.04 LTS / 18.10 : curl vulnerabilities (USN-3882-1)NessusUbuntu Local Security Checks
critical
121635SUSE SLED12 / SLES12 Security Update : curl (SUSE-SU-2019:0249-1)NessusSuSE Local Security Checks
critical
121632Slackware 14.0 / 14.1 / 14.2 / current : curl (SSA:2019-037-01)NessusSlackware Local Security Checks
critical
121628Debian DSA-4386-1 : curl - security updateNessusDebian Local Security Checks
critical
121618SUSE SLED15 / SLES15 Security Update : curl (SUSE-SU-2019:0248-1)NessusSuSE Local Security Checks
critical