Vulnerability Description
A heap use-after-free flaw was found in curl versions from 7.59.0 through 7.61.1 in the code related to closing an easy handle. When closing and cleaning up an 'easy' handle in the `Curl_close()` function, the library code first frees a struct (without nulling the pointer) and might then subsequently erroneously write to a struct field within that already freed struct.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Haxx | Curl | >= 7.59.0, < 7.62.0 |
| Canonical | Ubuntu Linux | 14.04 |
Related Weaknesses (CWE)
References
- http://www.securitytracker.com/id/1042013Third Party AdvisoryVDB Entry
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16840Issue TrackingThird Party Advisory
- https://curl.haxx.se/docs/CVE-2018-16840.htmlPatchVendor Advisory
- https://github.com/curl/curl/commit/81d135d67155c5295b1033679c606165d4e28f3fPatchThird Party Advisory
- https://security.gentoo.org/glsa/201903-03Third Party Advisory
- https://usn.ubuntu.com/3805-1/Third Party Advisory
- http://www.securitytracker.com/id/1042013Third Party AdvisoryVDB Entry
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16840Issue TrackingThird Party Advisory
- https://curl.haxx.se/docs/CVE-2018-16840.htmlPatchVendor Advisory
- https://github.com/curl/curl/commit/81d135d67155c5295b1033679c606165d4e28f3fPatchThird Party Advisory
- https://security.gentoo.org/glsa/201903-03Third Party Advisory
- https://usn.ubuntu.com/3805-1/Third Party Advisory
FAQ
What is CVE-2018-16840?
CVE-2018-16840 is a vulnerability with a CVSS score of 9.8 (CRITICAL). A heap use-after-free flaw was found in curl versions from 7.59.0 through 7.61.1 in the code related to closing an easy handle. When closing and cleaning up an 'easy' handle in the `Curl_close()` func...
How severe is CVE-2018-16840?
CVE-2018-16840 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2018-16840?
Check the references section above for vendor advisories and patch information. Affected products include: Haxx Curl, Canonical Ubuntu Linux.