Vulnerability Description
Curl versions 7.33.0 through 7.61.1 are vulnerable to a buffer overrun in the SASL authentication code that may lead to denial of service.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Haxx | Curl | >= 7.33.0, <= 7.61.1 |
| Debian | Debian Linux | 8.0 |
| Canonical | Ubuntu Linux | 14.04 |
Related Weaknesses (CWE)
References
- http://www.securitytracker.com/id/1042012Third Party AdvisoryVDB Entry
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16839Issue TrackingThird Party Advisory
- https://curl.haxx.se/docs/CVE-2018-16839.htmlPatchVendor Advisory
- https://github.com/curl/curl/commit/f3a24d7916b9173c69a3e0ee790102993833d6c5PatchThird Party Advisory
- https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37f
- https://lists.debian.org/debian-lts-announce/2018/11/msg00005.htmlMailing ListThird Party Advisory
- https://security.gentoo.org/glsa/201903-03Third Party Advisory
- https://usn.ubuntu.com/3805-1/Third Party Advisory
- https://www.debian.org/security/2018/dsa-4331Third Party Advisory
- http://www.securitytracker.com/id/1042012Third Party AdvisoryVDB Entry
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16839Issue TrackingThird Party Advisory
- https://curl.haxx.se/docs/CVE-2018-16839.htmlPatchVendor Advisory
- https://github.com/curl/curl/commit/f3a24d7916b9173c69a3e0ee790102993833d6c5PatchThird Party Advisory
- https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37f
- https://lists.debian.org/debian-lts-announce/2018/11/msg00005.htmlMailing ListThird Party Advisory
FAQ
What is CVE-2018-16839?
CVE-2018-16839 is a vulnerability with a CVSS score of 4.3 (MEDIUM). Curl versions 7.33.0 through 7.61.1 are vulnerable to a buffer overrun in the SASL authentication code that may lead to denial of service.
How severe is CVE-2018-16839?
CVE-2018-16839 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-16839?
Check the references section above for vendor advisories and patch information. Affected products include: Haxx Curl, Debian Debian Linux, Canonical Ubuntu Linux.