cURL/libcURL 7.x < 7.39.0 'curl_easy_duphandle()' Out-of-Bounds Read Issue

medium Nessus Network Monitor Plugin ID 8565
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

The cURL program is a library and command-line tool for transferring data using various protocols, including HTTP, FTP, and LDAP. A vulnerable version of cURL was detected from the host.

Description

Versions of cURL/libcURL older than 7.39.0 are unpatched for an out-of-bounds read vulnerability in the 'curl_easy_duphandle()' function, which is triggered when using the CURLOPT_COPYPOSTFIELDS option and sending a binary HTTP POST. This can be leveraged to cause a crash or disclose heap memory contents.

Solution

Upgrade the affected packages; the next version of cURL/libcURL that fixes the issue is cURL 7.39.0.

See Also

http://curl.haxx.se/docs/adv_20141105.html

Plugin Details

Severity: Medium

ID: 8565

Family: Web Clients

Published: 11/10/2014

Updated: 3/6/2019

Dependencies: 1735, 8314

Risk Information

CVSS v2

Risk Factor: Medium

Base Score: 4

Temporal Score: 3.5

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:N/A:P

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

CVSS v3

Risk Factor: Medium

Base Score: 4.8

Temporal Score: 4.6

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L

Temporal Vector: CVSS:3.0/E:X/RL:O/RC:C

Vulnerability Information

CPE: cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*

Patch Publication Date: 11/5/2014

Vulnerability Publication Date: 11/5/2014

Reference Information

CVE: CVE-2014-3707

BID: 70988