Lucene search

K
f5F5F5:K41523201
HistoryDec 23, 2020 - 12:00 a.m.

K41523201 : cURL vulnerability CVE-2019-5482

2020-12-2300:00:00
my.f5.com
27

9.9 High

AI Score

Confidence

High

0.098 Low

EPSS

Percentile

94.8%

Security Advisory Description

Heap buffer overflow in the TFTP protocol handler in cURL 7.19.4 to 7.65.3. (CVE-2019-5482)

Impact

An attacker could cause a denial of service (DoS) or arbitrary code execution if you use cURL to transfer data to or from a Trivial File Transport Protocol (TFTP) server and set the blksize (block size) option to a value below 504 (the default value is 512). Setting a smaller block size than the default should be rare as the primary use case for changing the block size is to make it larger.