Vulnerability Description
libcurl versions from 7.34.0 to before 7.64.0 are vulnerable to a heap out-of-bounds read in the code handling the end-of-response for SMTP. If the buffer passed to `smtp_endofresp()` isn't NUL terminated and contains no character ending the parsed number, and `len` is set to 5, then the `strtol()` call reads beyond the allocated buffer. The read contents will not be returned to the caller.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Haxx | Libcurl | >= 7.34.0, < 7.64.0 |
| Canonical | Ubuntu Linux | 14.04 |
| Debian | Debian Linux | 9.0 |
| Netapp | Clustered Data Ontap | All versions |
| Oracle | Communications Operations Monitor | 3.4 |
| Oracle | Http Server | 12.2.1.3.0 |
| Oracle | Secure Global Desktop | 5.4 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/106950Third Party AdvisoryVDB Entry
- https://access.redhat.com/errata/RHSA-2019:3701
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3823ExploitIssue TrackingPatch
- https://cert-portal.siemens.com/productcert/pdf/ssa-936080.pdf
- https://curl.haxx.se/docs/CVE-2019-3823.htmlPatchVendor Advisory
- https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37f
- https://security.gentoo.org/glsa/201903-03Third Party Advisory
- https://security.netapp.com/advisory/ntap-20190315-0001/ExploitThird Party Advisory
- https://usn.ubuntu.com/3882-1/Third Party Advisory
- https://www.debian.org/security/2019/dsa-4386Third Party Advisory
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.htmlPatchThird Party Advisory
- https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
- http://www.securityfocus.com/bid/106950Third Party AdvisoryVDB Entry
- https://access.redhat.com/errata/RHSA-2019:3701
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3823ExploitIssue TrackingPatch
FAQ
What is CVE-2019-3823?
CVE-2019-3823 is a vulnerability with a CVSS score of 4.3 (MEDIUM). libcurl versions from 7.34.0 to before 7.64.0 are vulnerable to a heap out-of-bounds read in the code handling the end-of-response for SMTP. If the buffer passed to `smtp_endofresp()` isn't NUL termin...
How severe is CVE-2019-3823?
CVE-2019-3823 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-3823?
Check the references section above for vendor advisories and patch information. Affected products include: Haxx Libcurl, Canonical Ubuntu Linux, Debian Debian Linux, Netapp Clustered Data Ontap, Oracle Communications Operations Monitor.