MEDIUM · 4.3

CVE-2014-3707

The curl_easy_duphandle function in libcurl 7.17.1 through 7.38.0, when running with the CURLOPT_COPYPOSTFIELDS option, does not properly copy HTTP POST data for an easy handle, which triggers an out-...

Vulnerability Description

The curl_easy_duphandle function in libcurl 7.17.1 through 7.38.0, when running with the CURLOPT_COPYPOSTFIELDS option, does not properly copy HTTP POST data for an easy handle, which triggers an out-of-bounds read that allows remote web servers to read sensitive memory information.

CVSS Score

4.3

MEDIUM

AV:N/AC:M/Au:N/C:P/I:N/A:N
Confidentiality
PARTIAL
Integrity
NONE
Availability
NONE

Affected Products

VendorProductVersions
CanonicalUbuntu Linux10.04
AppleMac Os X10.10.0
OpensuseOpensuse13.1
OracleHyperion11.1.2.2
DebianDebian Linux7.0
HaxxLibcurl7.17.1

Related Weaknesses (CWE)

References

FAQ

What is CVE-2014-3707?

CVE-2014-3707 is a vulnerability with a CVSS score of 4.3 (MEDIUM). The curl_easy_duphandle function in libcurl 7.17.1 through 7.38.0, when running with the CURLOPT_COPYPOSTFIELDS option, does not properly copy HTTP POST data for an easy handle, which triggers an out-...

How severe is CVE-2014-3707?

CVE-2014-3707 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2014-3707?

Check the references section above for vendor advisories and patch information. Affected products include: Canonical Ubuntu Linux, Apple Mac Os X, Opensuse Opensuse, Oracle Hyperion, Debian Debian Linux.