CRITICAL · 9.1

CVE-2018-1000122

A buffer over-read exists in curl 7.20.0 to and including curl 7.58.0 in the RTSP+RTP handling code that allows an attacker to cause a denial of service or information leakage

Vulnerability Description

A buffer over-read exists in curl 7.20.0 to and including curl 7.58.0 in the RTSP+RTP handling code that allows an attacker to cause a denial of service or information leakage

CVSS Score

9.1

CRITICAL

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
NONE
Availability
HIGH

Affected Products

VendorProductVersions
DebianDebian Linux7.0
CanonicalUbuntu Linux12.04
HaxxCurl>= 7.20.0, <= 7.58.0
RedhatEnterprise Linux Desktop7.0
RedhatEnterprise Linux Server7.0
RedhatEnterprise Linux Workstation7.0
OracleCommunications Webrtc Session Controller< 7.2
OracleEnterprise Manager Ops Center12.2.2
OraclePeoplesoft Enterprise Peopletools8.55

Related Weaknesses (CWE)

References

FAQ

What is CVE-2018-1000122?

CVE-2018-1000122 is a vulnerability with a CVSS score of 9.1 (CRITICAL). A buffer over-read exists in curl 7.20.0 to and including curl 7.58.0 in the RTSP+RTP handling code that allows an attacker to cause a denial of service or information leakage

How severe is CVE-2018-1000122?

CVE-2018-1000122 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.

Is there a patch for CVE-2018-1000122?

Check the references section above for vendor advisories and patch information. Affected products include: Debian Debian Linux, Canonical Ubuntu Linux, Haxx Curl, Redhat Enterprise Linux Desktop, Redhat Enterprise Linux Server.