libcurl.so is vulnerable to denial of service. A buffer overrun in the SASL authentication code allows an attacker to crash the application.
CPE | Name | Operator | Version |
---|---|---|---|
libcurl.so | le | 4.7.0.debug | |
curl | le | 7.30.0.2 | |
libcurl.so | le | 4.7.0.debug | |
curl | le | 7.30.0.2 |
www.securitytracker.com/id/1042012
bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16839
curl.haxx.se/docs/CVE-2018-16839.html
github.com/curl/curl/commit/f3a24d7916b9173c69a3e0ee790102993833d6c5
lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f@%3Cdevnull.infra.apache.org%3E
lists.debian.org/debian-lts-announce/2018/11/msg00005.html
security.gentoo.org/glsa/201903-03
usn.ubuntu.com/3805-1/
www.debian.org/security/2018/dsa-4331