7.5
CVSSv2

CVE-2013-0249

Published: 08/03/2013 Updated: 08/12/2016
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Stack-based buffer overflow in the Curl_sasl_create_digest_md5_message function in lib/curl_sasl.c in curl and libcurl 7.26.0 up to and including 7.28.1, when negotiating SASL DIGEST-MD5 authentication, allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via a long string in the realm parameter in a (1) POP3, (2) SMTP or (3) IMAP message.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

haxx curl 7.26.0

haxx libcurl 7.26.0

haxx curl 7.28.1

haxx libcurl 7.28.1

haxx curl 7.27.0

haxx libcurl 7.27.0

haxx curl 7.28.0

haxx libcurl 7.28.0

canonical ubuntu linux 12.10

Vendor Advisories

Debian Bug report logs - #700002 curl: CVE-2013-0249 Package: curl; Maintainer for curl is Alessandro Ghedini <ghedo@debianorg>; Source for curl is src:curl (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@inutilorg> Date: Thu, 7 Feb 2013 08:39:02 UTC Severity: grave Tags: patch, security Found in vers ...
curl could be made to crash or run programs if it opened a malicious URL ...

Exploits

cURL buffer overflow Wed 06 February 2013 Volema found remotely exploitable buffer overflow vulnerability in libcurl POP3, SMTP protocol handlers which lead to code execution (RCE) When negotiating SASL DIGEST-MD5 authentication, the function Curl_sasl_create_digest_md5_message() uses the data provided from the server without doing the proper len ...
A remotely exploitable buffer overflow vulnerability was discovered in the libcurl POP3 and SMTP protocol handlers Proper exploitation can allow for arbitrary code execution ...