Lucene search

K
cve[email protected]CVE-2013-0249
HistoryMar 08, 2013 - 10:55 p.m.

CVE-2013-0249

2013-03-0822:55:01
CWE-119
web.nvd.nist.gov
46
cve-2013-0249
buffer overflow
curl
libcurl
denial of service
remote code execution
nvd
cve

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

8 High

AI Score

Confidence

Low

0.923 High

EPSS

Percentile

99.0%

Stack-based buffer overflow in the Curl_sasl_create_digest_md5_message function in lib/curl_sasl.c in curl and libcurl 7.26.0 through 7.28.1, when negotiating SASL DIGEST-MD5 authentication, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long string in the realm parameter in a (1) POP3, (2) SMTP or (3) IMAP message.

Affected configurations

NVD
Node
haxxcurlMatch7.26.0
OR
haxxcurlMatch7.27.0
OR
haxxcurlMatch7.28.0
OR
haxxcurlMatch7.28.1
OR
haxxlibcurlMatch7.26.0
OR
haxxlibcurlMatch7.27.0
OR
haxxlibcurlMatch7.28.0
OR
haxxlibcurlMatch7.28.1
Node
canonicalubuntu_linuxMatch12.10

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

8 High

AI Score

Confidence

Low

0.923 High

EPSS

Percentile

99.0%