Lucene search

K
ubuntuUbuntuUSN-3993-2
HistoryMay 22, 2019 - 12:00 a.m.

curl vulnerability

2019-05-2200:00:00
ubuntu.com
144

4.6 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.6 High

AI Score

Confidence

High

0.07 Low

EPSS

Percentile

94.0%

Releases

  • Ubuntu 14.04 ESM
  • Ubuntu 12.04

Packages

  • curl - HTTP, HTTPS, and FTP client and client libraries

Details

USN-3993-1 fixed a vulnerability in curl. This update provides
the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM.

Original advisory details:

It was discovered that curl incorrectly handled memory when receiving data
from a TFTP server. A remote attacker could use this issue to cause curl to
crash, resulting in a denial of service, or possibly execute arbitrary
code. (CVE-2019-5436)

OSVersionArchitecturePackageVersionFilename
Ubuntu14.04noarchlibcurl3-gnutls< 7.35.0-1ubuntu2.20+esm2UNKNOWN
Ubuntu14.04noarchcurl< 7.35.0-1ubuntu2.20UNKNOWN
Ubuntu14.04noarchcurl-dbgsym< 7.35.0-1ubuntu2.20UNKNOWN
Ubuntu14.04noarchcurl-udeb< 7.35.0-1ubuntu2.20UNKNOWN
Ubuntu14.04noarchcurl-udeb-dbgsym< 7.35.0-1ubuntu2.20UNKNOWN
Ubuntu14.04noarchlibcurl3< 7.35.0-1ubuntu2.20UNKNOWN
Ubuntu14.04noarchlibcurl3-dbg< 7.35.0-1ubuntu2.20UNKNOWN
Ubuntu14.04noarchlibcurl3-dbgsym< 7.35.0-1ubuntu2.20UNKNOWN
Ubuntu14.04noarchlibcurl3-gnutls< 7.35.0-1ubuntu2.20UNKNOWN
Ubuntu14.04noarchlibcurl3-gnutls-dbgsym< 7.35.0-1ubuntu2.20UNKNOWN
Rows per page:
1-10 of 271

4.6 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.6 High

AI Score

Confidence

High

0.07 Low

EPSS

Percentile

94.0%