CVE-2018-1000121

Related Vulnerabilities: CVE-2018-1000121  

A NULL pointer dereference flaw was found in the way libcurl checks values returned by the openldap ldap_get_attribute_ber() function. A malicious LDAP server could use this flaw to crash a libcurl client application via a specially crafted LDAP reply.

A NULL pointer dereference flaw was found in the way libcurl checks values returned by the openldap ldap_get_attribute_ber() function. A malicious LDAP server could use this flaw to crash a libcurl client application via a specially crafted LDAP reply.

Find out more about CVE-2018-1000121 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v3 metrics

CVSS3 Base Score 5.3
CVSS3 Base Metrics CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Attack Vector Network
Attack Complexity Low
Privileges Required None
User Interaction None
Scope Unchanged
Confidentiality None
Integrity Impact None
Availability Impact Low

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux 7 (curl) RHSA-2018:3157 2018-10-30
Red Hat Software Collections for Red Hat Enterprise Linux 6 (httpd24-curl) RHSA-2018:3558 2018-11-13
Red Hat Software Collections for Red Hat Enterprise Linux 7 (httpd24-curl) RHSA-2018:3558 2018-11-13

Affected Packages State

Platform Package State
Red Hat JBoss Core Services 1 curl Affected
Red Hat Enterprise Linux 6 curl Not affected
Red Hat Enterprise Linux 5 curl Not affected
Red Hat Ceph Storage 2 curl Will not fix
.NET Core 2.0 on Red Hat Enterprise Linux rh-dotnet20-curl Affected
.NET Core 2.0 on Red Hat Enterprise Linux rh-dotnet21-curl Affected
.NET Core 1.0 on Red Hat Enterprise Linux rh-dotnetcore10-curl Affected
.NET Core 1.0 on Red Hat Enterprise Linux rh-dotnetcore11-curl Affected

Acknowledgements

Red Hat would like to thank the Curl project for reporting this issue. Upstream acknowledges Dario Weisser as the original reporter.

External References