Vulnerability Name: | CVE-2012-0036 (CCN-72692) | ||||||||||||||||||||
Assigned: | 2011-12-07 | ||||||||||||||||||||
Published: | 2012-01-24 | ||||||||||||||||||||
Updated: | 2018-01-10 | ||||||||||||||||||||
Summary: | curl and libcurl 7.2x before 7.24.0 do not properly consider special characters during extraction of a pathname from a URL, which allows remote attackers to conduct data-injection attacks via a crafted URL, as demonstrated by a CRLF injection attack on the (1) IMAP, (2) POP3, or (3) SMTP protocol. | ||||||||||||||||||||
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
| ||||||||||||||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P) 5.5 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
3.2 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C)
| ||||||||||||||||||||
Vulnerability Type: | CWE-89 | ||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||
References: | Source: CONFIRM Type: Patch http://curl.haxx.se/curl-url-sanitize.patch Source: CCN Type: cURL Security Advisory, January 24th 2012 curl URL sanitization vulnerability Source: CONFIRM Type: Vendor Advisory http://curl.haxx.se/docs/adv_20120124.html Source: MITRE Type: CNA CVE-2012-0036 Source: HP Type: UNKNOWN HPSBMU02786 Source: APPLE Type: UNKNOWN APPLE-SA-2012-05-09-1 Source: CCN Type: SA47690 cURL SSL/TLS IV Selection Weakness and URL Sanitisation Vulnerability Source: SECUNIA Type: UNKNOWN 48256 Source: GENTOO Type: UNKNOWN GLSA-201203-02 Source: CONFIRM Type: UNKNOWN http://support.apple.com/kb/HT5281 Source: DEBIAN Type: UNKNOWN DSA-2398 Source: DEBIAN Type: DSA-2398 curl -- several vulnerabilities Source: MANDRIVA Type: UNKNOWN MDVSA-2012:058 Source: CCN Type: Oracle Critical Patch Update - July 2015 Oracle Critical Patch Update - July 2015 Source: CONFIRM Type: UNKNOWN http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html Source: CCN Type: OSVDB ID: 78512 cURL Multiple Protocol File Path URL Parsing Control Character Injection Source: BID Type: UNKNOWN 51665 Source: CCN Type: BID-51665 cURL/libcURL Remote Input Validation Vulnerability Source: SECTRACK Type: UNKNOWN 1032924 Source: CONFIRM Type: UNKNOWN https://bugzilla.redhat.com/show_bug.cgi?id=773457 Source: XF Type: UNKNOWN curl-file-path-crlf-injection(72692) Source: CONFIRM Type: UNKNOWN https://github.com/bagder/curl/commit/75ca568fa1c19de4c5358fed246686de8467c238 Source: CONFIRM Type: UNKNOWN https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03760en_us | ||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: ![]() | ||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||
| |||||||||||||||||||||
BACK |