Vulnerability Name:

CVE-2018-1000122

Assigned:2018-03-14
Published:2018-03-14
Updated:2018-05-25
Summary:A buffer over-read exists in curl 7.20.0 to and including curl 7.58.0 in the RTSP+RTP handling code that allows an attacker to cause a denial of service or information leakage
CVSS v3 Severity:9.1 Critical (CVSS v3 Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H)
7.9 High (Temporal CVSS v3 Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): None
Availibility (A): High
6.5 Medium (CCN CVSS v3 Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L)
5.7 Medium (CCN Temporal CVSS v3 Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:6.4 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): Partial
6.4 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-119
References:Source: BID
Type: VENDOR_ADVISORY
103436

Source: SECTRACK
Type: VENDOR_ADVISORY
1040530

Source: CONFIRM
Type: VENDOR_ADVISORY
https://curl.haxx.se/docs/adv_2018-b047.html

Source: XF
Type: UNKNOWN
curl-cve20181000122-info-disc(140316)

Source: MLIST
Type: VENDOR_ADVISORY
[debian-lts-announce] 20180318 [SECURITY] [DLA 1309-1] curl security update

Source: UBUNTU
Type: VENDOR_ADVISORY
USN-3598-1

Source: UBUNTU
Type: UNKNOWN
USN-3598-2

Source: DEBIAN
Type: VENDOR_ADVISORY
DSA-4136

Vulnerable Configuration:Configuration 1:
  • cpe:/o:debian:debian_linux:7.0:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:9.0:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/o:canonical:ubuntu_linux:14.04::~~lts~~~:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu_linux:16.04::~~lts~~~:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*

  • Configuration 3:
  • cpe:/a:haxx:curl:7.20.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.20.1:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.21.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.21.1:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.21.2:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.21.3:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.21.4:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.21.5:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.21.6:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.21.7:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.22.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.23.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.23.1:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.24.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.25.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.26.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.27.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.28.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.28.1:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.29.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.30.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.31.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.32.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.33.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.34.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.35.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.36.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.37.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.37.1:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.38.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.39.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.40.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.41.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.42.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.42.1:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.43.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.44.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.45.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.46.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.47.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.47.1:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.48.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.49.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.49.1:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.50.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.50.1:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.50.2:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.50.3:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.51.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.52.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.52.1:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.53.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.53.1:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.54.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.54.1:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.55.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.55.1:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.56.0:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.56.1:*:*:*:*:*:*:*
  • OR cpe:/a:haxx:curl:7.57.0:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:curl:curl:7.58.0:*:*:*:*:*:*:*
  • OR cpe:/a:curl:curl:7.20.0:*:*:*:*:*:*:*

  • Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20181000122
    V
    CVE-2018-1000122
    2018-06-18
    oval:com.ubuntu.artful:def:20181000122000
    V
    CVE-2018-1000122 on Ubuntu 17.10 (artful) - medium.
    2018-03-14
    oval:com.ubuntu.xenial:def:20181000122000
    V
    CVE-2018-1000122 on Ubuntu 16.04 LTS (xenial) - medium.
    2018-03-14
    oval:com.ubuntu.trusty:def:20181000122000
    V
    CVE-2018-1000122 on Ubuntu 14.04 LTS (trusty) - medium.
    2018-03-14
    BACK
    debian debian linux 7.0
    debian debian linux 8.0
    debian debian linux 9.0
    canonical ubuntu linux 14.04
    canonical ubuntu linux 16.04
    canonical ubuntu linux 17.10
    haxx curl 7.20.0
    haxx curl 7.20.1
    haxx curl 7.21.0
    haxx curl 7.21.1
    haxx curl 7.21.2
    haxx curl 7.21.3
    haxx curl 7.21.4
    haxx curl 7.21.5
    haxx curl 7.21.6
    haxx curl 7.21.7
    haxx curl 7.22.0
    haxx curl 7.23.0
    haxx curl 7.23.1
    haxx curl 7.24.0
    haxx curl 7.25.0
    haxx curl 7.26.0
    haxx curl 7.27.0
    haxx curl 7.28.0
    haxx curl 7.28.1
    haxx curl 7.29.0
    haxx curl 7.30.0
    haxx curl 7.31.0
    haxx curl 7.32.0
    haxx curl 7.33.0
    haxx curl 7.34.0
    haxx curl 7.35.0
    haxx curl 7.36.0
    haxx curl 7.37.0
    haxx curl 7.37.1
    haxx curl 7.38.0
    haxx curl 7.39.0
    haxx curl 7.40.0
    haxx curl 7.41.0
    haxx curl 7.42.0
    haxx curl 7.42.1
    haxx curl 7.43.0
    haxx curl 7.44.0
    haxx curl 7.45.0
    haxx curl 7.46.0
    haxx curl 7.47.0
    haxx curl 7.47.1
    haxx curl 7.48.0
    haxx curl 7.49.0
    haxx curl 7.49.1
    haxx curl 7.50.0
    haxx curl 7.50.1
    haxx curl 7.50.2
    haxx curl 7.50.3
    haxx curl 7.51.0
    haxx curl 7.52.0
    haxx curl 7.52.1
    haxx curl 7.53.0
    haxx curl 7.53.1
    haxx curl 7.54.0
    haxx curl 7.54.1
    haxx curl 7.55.0
    haxx curl 7.55.1
    haxx curl 7.56.0
    haxx curl 7.56.1
    haxx curl 7.57.0
    curl curl 7.58.0
    curl curl 7.20.0