9
CVSSv2

CVE-2015-3144

Published: 24/04/2015 Updated: 17/10/2018
CVSS v2 Base Score: 9 | Impact Score: 10 | Exploitability Score: 8
VMScore: 801
Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C

Vulnerability Summary

The fix_hostname function in cURL and libcurl 7.37.0 up to and including 7.41.0 does not properly calculate an index, which allows remote malicious users to cause a denial of service (out-of-bounds read or write and crash) or possibly have other unspecified impact via a zero-length host name, as demonstrated by ":80" and ":80."

Vulnerable Product Search on Vulmon Subscribe to Product

oracle mysql enterprise monitor

haxx curl 7.39.0

haxx curl 7.40.0

haxx curl 7.37.0

haxx curl 7.41.0

haxx curl 7.37.1

haxx curl 7.38.0

haxx libcurl 7.40.0

haxx libcurl 7.41.0

haxx libcurl 7.37.0

haxx libcurl 7.37.1

haxx libcurl 7.38.0

haxx libcurl 7.39

canonical ubuntu linux 14.10

canonical ubuntu linux 12.04

canonical ubuntu linux 14.04

canonical ubuntu linux 15.04

debian debian linux 7.0

Vendor Advisories

Several security issues were fixed in curl ...
Several vulnerabilities were discovered in cURL, an URL transfer library: CVE-2015-3143 NTLM-authenticated connections could be wrongly reused for requests without any credentials set, leading to HTTP requests being sent over the connection authenticated as a different user This is similar to the issue fixed in DSA-2849-1 CVE-201 ...
It was discovered that libcurl could incorrectly reuse NTLM-authenticated connections for subsequent unauthenticated requests to the same host If an application using libcurl established an NTLM-authenticated connection to a server, and sent subsequent unauthenticed requests to the same server, the unauthenticated requests could be sent over the N ...
It was discovered that libcurl did not properly process zero-length host names If an attacker could trick an application using libcurl into processing zero-length host names, this could lead to an out-of-bounds read, and possibly cause that application to crash ...