CVE-2019-5435
Published: 22 May 2019
An integer overflow in curl's URL API results in a buffer overflow in libcurl 7.62.0 to and including 7.64.1.
Notes
Author | Note |
---|---|
mdeslaur | 7.62.0+ only |
Priority
Status
Package | Release | Status |
---|---|---|
curl Launchpad, Ubuntu, Debian |
upstream |
Released
(7.65.0)
|
xenial |
Not vulnerable
(code not present)
|
|
bionic |
Not vulnerable
(code not present)
|
|
cosmic |
Not vulnerable
(code not present)
|
|
disco |
Released
(7.64.0-2ubuntu1.1)
|
|
Patches: upstream: https://github.com/curl/curl/commit/5fc28510a4664f4 |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 3.7 |
Attack vector | Network |
Attack complexity | High |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | None |
Availability impact | Low |
Vector | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L |