CVE-2019-5482

CRITICAL

Haxx Curl < 7.65.3 - Out-of-Bounds Write

Title source: rule
STIX 2.1

Description

Heap buffer overflow in the TFTP protocol handler in cURL 7.19.4 to 7.65.3.

References (14)

Core 14
Core References
Mailing List, Third Party Advisory vendor-advisory x_refsource_suse
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00048.html
Mailing List, Third Party Advisory vendor-advisory x_refsource_suse
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00055.html
Third Party Advisory vendor-advisory x_refsource_debian
https://www.debian.org/security/2020/dsa-4633
Mailing List, Third Party Advisory mailing-list x_refsource_bugtraq
https://seclists.org/bugtraq/2020/Feb/36
Third Party Advisory vendor-advisory x_refsource_gentoo
https://security.gentoo.org/glsa/202003-29
Patch, Third Party Advisory x_refsource_misc
https://www.oracle.com/security-alerts/cpuapr2020.html
Patch, Third Party Advisory x_refsource_misc
https://www.oracle.com/security-alerts/cpujan2020.html
Third Party Advisory x_refsource_confirm
https://security.netapp.com/advisory/ntap-20200416-0003/
Patch, Third Party Advisory x_refsource_misc
https://www.oracle.com/security-alerts/cpuoct2020.html
Third Party Advisory x_refsource_confirm
https://security.netapp.com/advisory/ntap-20191004-0003/
Vendor Advisory x_refsource_confirm
https://curl.haxx.se/docs/CVE-2019-5482.html

Scores

CVSS v3 9.8
EPSS 0.0854
EPSS Percentile 92.4%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable yes
Technical Impact total

Details

CWE
CWE-122 CWE-787
Status published
Products (30)
None/curl 7.19.4 to 7.65.3
debian/debian_linux 9.0
debian/debian_linux 10.0
fedoraproject/fedora 29
fedoraproject/fedora 30
fedoraproject/fedora 31
haxx/curl 7.19.4 - 7.65.3
netapp/cloud_backup
netapp/oncommand_insight
netapp/oncommand_unified_manager 7.3
... and 20 more
Published Sep 16, 2019
Tracked Since Feb 18, 2026