Lucene search

K
f5F5F5:K55133295
HistoryJul 25, 2019 - 12:00 a.m.

K55133295 : cURL and libcurl vulnerability CVE-2019-5436

2019-07-2500:00:00
my.f5.com
19

8.2 High

AI Score

Confidence

High

0.07 Low

EPSS

Percentile

94.0%

Security Advisory Description

A heap buffer overflow in the TFTP receiving code allows for DoS or arbitrary code execution in libcurl versions 7.19.4 through 7.64.1. (CVE-2019-5436)

Impact

An attacker could cause a denial of service (DoS) or arbitrary code execution, if you use cURL to transfer data to or from a TFTP server, and set the blksize (block size) option to a value below 504 (the default value is 512). Users setting a smaller block size than default should be rare as the primary use case for changing the block size is to make it larger.