CRITICAL · 9.8

CVE-2019-5482

Heap buffer overflow in the TFTP protocol handler in cURL 7.19.4 to 7.65.3.

Vulnerability Description

Heap buffer overflow in the TFTP protocol handler in cURL 7.19.4 to 7.65.3.

CVSS Score

9.8

CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
HaxxCurl>= 7.19.4, <= 7.65.3
FedoraprojectFedora29
OpensuseLeap15.0
NetappCloud Backup-
NetappOncommand Insight-
NetappOncommand Unified Manager>= 7.3
NetappOncommand Workflow Automation-
NetappSnapcenter-
NetappSteelstore Cloud Integrated Storage-
OracleCommunications Operations Monitor3.4
OracleCommunications Session Border Controller8.3
OracleEnterprise Manager Ops Center12.3.3
OracleHttp Server12.2.1.3.0
OracleHyperion Essbase11.1.2.4
OracleMysql Server>= 5.0.0, <= 5.7.28
OracleOss Support Tools20.0
DebianDebian Linux9.0

Related Weaknesses (CWE)

References

FAQ

What is CVE-2019-5482?

CVE-2019-5482 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Heap buffer overflow in the TFTP protocol handler in cURL 7.19.4 to 7.65.3.

How severe is CVE-2019-5482?

CVE-2019-5482 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.

Is there a patch for CVE-2019-5482?

Check the references section above for vendor advisories and patch information. Affected products include: Haxx Curl, Fedoraproject Fedora, Opensuse Leap, Netapp Cloud Backup, Netapp Oncommand Insight.