CVE编号
CVE-2019-3823利用情况
暂无补丁情况
官方补丁披露时间
2019-02-07漏洞描述
从7.34.0到7.64.0之前的libcurl版本容易受到处理SMTP响应结束的代码中读取的堆越界限制的影响。如果传递给`smtp_endofresp()`的缓冲区不是NUL终止并且不包含结束解析数字的字符,并且`len`设置为5,那么`strtol()`调用将超出分配的缓冲区。读取的内容不会返回给调用者。解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
http://www.securityfocus.com/bid/106950 | |
https://access.redhat.com/errata/RHSA-2019:3701 | |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3823 | |
https://cert-portal.siemens.com/productcert/pdf/ssa-936080.pdf | |
https://curl.haxx.se/docs/CVE-2019-3823.html | |
https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f... | |
https://security.gentoo.org/glsa/201903-03 | |
https://security.netapp.com/advisory/ntap-20190315-0001/ | |
https://usn.ubuntu.com/3882-1/ | |
https://www.debian.org/security/2019/dsa-4386 | |
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html | |
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | haxx | libcurl | * |
From (including) 7.34.0 |
Up to (excluding) 7.64.0 |
||||
运行在以下环境 | |||||||||
应用 | oracle | communications_operations_monitor | 3.4 | - | |||||
运行在以下环境 | |||||||||
应用 | oracle | communications_operations_monitor | 4.0 | - | |||||
运行在以下环境 | |||||||||
应用 | oracle | http_server | 12.2.1.3.0 | - | |||||
运行在以下环境 | |||||||||
应用 | oracle | secure_global_desktop | 5.4 | - | |||||
运行在以下环境 | |||||||||
系统 | alpine_3.10 | curl | * |
Up to (excluding) 7.64.0-r0 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_3.11 | curl | * |
Up to (excluding) 7.64.0-r0 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_3.12 | curl | * |
Up to (excluding) 7.64.0-r0 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_3.13 | curl | * |
Up to (excluding) 7.64.0-r0 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_3.14 | curl | * |
Up to (excluding) 7.64.0-r0 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_3.15 | curl | * |
Up to (excluding) 7.64.0-r0 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_3.6 | curl | * |
Up to (excluding) 7.61.1-r2 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_3.7 | curl | * |
Up to (excluding) 7.61.1-r2 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_3.8 | curl | * |
Up to (excluding) 7.61.1-r2 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_3.9 | curl | * |
Up to (excluding) 7.64.0-r0 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_edge | curl | * |
Up to (excluding) 7.64.0-r0 |
|||||
运行在以下环境 | |||||||||
系统 | amazon_2 | curl | * |
Up to (excluding) 7.61.1-9.amzn2.0.1 |
|||||
运行在以下环境 | |||||||||
系统 | centos_8 | curl | * |
Up to (excluding) 7.61.1-11.el8 |
|||||
运行在以下环境 | |||||||||
系统 | debian_8 | curl | * |
Up to (excluding) 7.38.0-4+deb8u1 |
|||||
运行在以下环境 | |||||||||
系统 | debian_9 | curl | * |
Up to (excluding) 7.52.1-5+deb9u9 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_29 | curl | * |
Up to (excluding) 7.61.1-8.fc29 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.0 | curl | * |
Up to (excluding) 7.60.0-lp150.2.18.1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_42.3 | curl | * |
Up to (excluding) 7.37.0-45.1 |
|||||
运行在以下环境 | |||||||||
系统 | oracle_8 | curl | * |
Up to (excluding) 7.61.1-11.el8 |
|||||
运行在以下环境 | |||||||||
系统 | redhat_8 | curl | * |
Up to (excluding) 7.61.1-11.el8 |
|||||
运行在以下环境 | |||||||||
系统 | suse_12_SP3 | curl | * |
Up to (excluding) 7.37.0-37.34.1 |
|||||
运行在以下环境 | |||||||||
系统 | suse_12_SP4 | curl | * |
Up to (excluding) 7.60.0-4.3.1 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_14.04 | curl | * |
Up to (excluding) 7.35.0-1ubuntu2.20 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_16.04 | curl | * |
Up to (excluding) 7.47.0-1ubuntu2.12 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_18.04 | curl | * |
Up to (excluding) 7.58.0-2ubuntu3.6 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_20.04 | curl | * |
Up to (excluding) 7.64.0-1ubuntu1 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_21.04 | curl | * |
Up to (excluding) 7.64.0-1ubuntu1 |
|||||
- 攻击路径 远程
- 攻击复杂度 复杂
- 权限要求 无需权限
- 影响范围 有限影响
- EXP成熟度 未验证
- 补丁情况 官方补丁
- 数据保密性 无影响
- 数据完整性 无影响
- 服务器危害 无影响
- 全网数量 100
还没有评论,来说两句吧...