10 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.037 Low
EPSS
Percentile
91.8%
Issue Overview:
curl before version 7.61.1 is vulnerable to a buffer overrun in the NTLM authentication code. The internal function Curl_ntlm_core_mk_nt_hash multiplies the length of the password by two (SUM) to figure out how large temporary storage area to allocate from the heap. The length value is then subsequently used to iterate over the password and generate output into the allocated storage buffer. On systems with a 32 bit size_t, the math to calculate SUM triggers an integer overflow when the password length exceeds 2GB (2^31 bytes). This integer overflow usually causes a very small buffer to actually get allocated instead of the intended very huge one, making the use of that buffer end up in a heap buffer overflow. (This bug is almost identical to CVE-2017-8816.)(CVE-2018-14618)
Affected Packages:
curl
Issue Correction:
Run yum update curl to update your system.
New Packages:
i686:
libcurl-devel-7.53.1-16.85.amzn1.i686
curl-debuginfo-7.53.1-16.85.amzn1.i686
libcurl-7.53.1-16.85.amzn1.i686
curl-7.53.1-16.85.amzn1.i686
src:
curl-7.53.1-16.85.amzn1.src
x86_64:
curl-7.53.1-16.85.amzn1.x86_64
libcurl-devel-7.53.1-16.85.amzn1.x86_64
libcurl-7.53.1-16.85.amzn1.x86_64
curl-debuginfo-7.53.1-16.85.amzn1.x86_64
Red Hat: CVE-2018-14618
Mitre: CVE-2018-14618
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Amazon Linux | 1 | i686 | libcurl-devel | < 7.53.1-16.85.amzn1 | libcurl-devel-7.53.1-16.85.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | curl-debuginfo | < 7.53.1-16.85.amzn1 | curl-debuginfo-7.53.1-16.85.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | libcurl | < 7.53.1-16.85.amzn1 | libcurl-7.53.1-16.85.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | curl | < 7.53.1-16.85.amzn1 | curl-7.53.1-16.85.amzn1.i686.rpm |
Amazon Linux | 1 | x86_64 | curl | < 7.53.1-16.85.amzn1 | curl-7.53.1-16.85.amzn1.x86_64.rpm |
Amazon Linux | 1 | x86_64 | libcurl-devel | < 7.53.1-16.85.amzn1 | libcurl-devel-7.53.1-16.85.amzn1.x86_64.rpm |
Amazon Linux | 1 | x86_64 | libcurl | < 7.53.1-16.85.amzn1 | libcurl-7.53.1-16.85.amzn1.x86_64.rpm |
Amazon Linux | 1 | x86_64 | curl-debuginfo | < 7.53.1-16.85.amzn1 | curl-debuginfo-7.53.1-16.85.amzn1.x86_64.rpm |
10 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.037 Low
EPSS
Percentile
91.8%