curl / Docs / Vulnerability table / 7.34.0 vulnerabilities

Vulnerabilities in curl 7.34.0

curl version 7.34.0 was released on December 17 2013. The following 51 security problems are known to exist in this version.

FlawFrom versionTo and includingCVECWE
warning message out-of-buffer read7.14.17.61.1CVE-2018-16842CWE-125: Out-of-bounds Read
SASL password overflow via integer overflow7.33.07.61.1CVE-2018-16839CWE-131: Incorrect Calculation of Buffer Size
NTLM password overflow via integer overflow7.15.47.61.0CVE-2018-14618CWE-131: Incorrect Calculation of Buffer Size
RTSP bad headers buffer over-read7.20.07.59.0CVE-2018-1000301CWE-126: Buffer Over-read
RTSP RTP buffer over-read7.20.07.58.0CVE-2018-1000122CWE-126: Buffer Over-read
LDAP NULL pointer dereference7.21.07.58.0CVE-2018-1000121CWE-476: NULL Pointer Dereference
FTP path trickery leads to NIL byte out of bounds write7.12.37.58.0CVE-2018-1000120CWE-122: Heap-based Buffer Overflow
HTTP authentication leak in redirects6.07.57.0CVE-2018-1000007CWE-522: Insufficiently Protected Credentials
FTP wildcard out of bounds read7.21.07.56.1CVE-2017-8817CWE-126: Buffer Over-read
IMAP FETCH response out of bounds read7.20.07.56.0CVE-2017-1000257CWE-126: Buffer Over-read
FTP PWD response parser out of bounds read7.77.55.1CVE-2017-1000254CWE-126: Buffer Over-read
URL globbing out of bounds read7.34.07.54.1CVE-2017-1000101CWE-126: Buffer Over-read
TFTP sends more than buffer size7.15.07.54.1CVE-2017-1000100CWE-126: Buffer Over-read
--write-out out of buffer read6.57.53.1CVE-2017-7407CWE-126: Buffer Over-read
printf floating point buffer overflow7.17.51.0CVE-2016-9586CWE-121: Stack-based Buffer Overflow
Win CE schannel cert wildcard matches too much7.30.07.51.0CVE-2016-9952CWE-295: Improper Certificate Validation
Win CE schannel cert name out of buffer read7.30.07.51.0CVE-2016-9953CWE-126: Buffer Over-read
cookie injection for other servers7.17.50.3CVE-2016-8615CWE-187: Partial Comparison
case insensitive password comparison7.77.50.3CVE-2016-8616CWE-178: Improper Handling of Case Sensitivity
OOB write via unchecked multiplication7.17.50.3CVE-2016-8617CWE-131: Incorrect Calculation of Buffer Size
double-free in curl_maprintf7.17.50.3CVE-2016-8618CWE-415: Double Free
double-free in krb5 code7.37.50.3CVE-2016-8619CWE-415: Double Free
glob parser write/read out of bounds7.34.07.50.3CVE-2016-8620CWE-122: Heap-based Buffer Overflow
curl_getdate read out of bounds7.12.27.50.3CVE-2016-8621CWE-126: Buffer Over-read
URL unescape heap overflow via integer truncation7.24.07.50.3CVE-2016-8622CWE-122: Heap-based Buffer Overflow
Use-after-free via shared cookies7.10.77.50.3CVE-2016-8623CWE-416: Use After Free
invalid URL parsing with '#'7.17.50.3CVE-2016-8624CWE-172: Encoding Error
IDNA 2003 makes curl use wrong host7.12.07.50.3CVE-2016-8625CWE-838: Inappropriate Encoding for Output Context
curl escape and unescape integer overflows7.11.17.50.2CVE-2016-7167CWE-131: Incorrect Calculation of Buffer Size
Incorrect reuse of client certificates7.19.67.50.1CVE-2016-7141CWE-305: Authentication Bypass by Primary Weakness
TLS session resumption client cert bypass7.17.50.0CVE-2016-5419CWE-305: Authentication Bypass by Primary Weakness
Re-using connections with wrong client cert7.17.50.0CVE-2016-5420CWE-305: Authentication Bypass by Primary Weakness
use of connection struct after free7.32.07.50.0CVE-2016-5421CWE-416: Use After Free
Windows DLL hijacking7.11.17.49.0CVE-2016-4802CWE-94: Improper Control of Generation of Code ('Code Injection')
TLS certificate check bypass with mbedTLS/PolarSSL7.21.07.48.0CVE-2016-3739CWE-297: Improper Validation of Certificate with Host Mismatch
remote file name path traversal in curl tool for Windows7.20.07.46.0CVE-2016-0754CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
NTLM credentials not-checked for proxy connection re-use7.10.77.46.0CVE-2016-0755CWE-305: Authentication Bypass by Primary Weakness
sensitive HTTP server headers also sent to proxies7.17.42.0CVE-2015-3153CWE-201: Information Exposure Through Sent Data
cookie parser out of boundary memory access7.31.07.41.0CVE-2015-3145CWE-124: Buffer Underwrite ('Buffer Underflow')
Negotiate not treated as connection-oriented7.10.67.41.0CVE-2015-3148CWE-305: Authentication Bypass by Primary Weakness
Re-using authenticated connection when unauthenticated7.10.67.41.0CVE-2015-3143CWE-305: Authentication Bypass by Primary Weakness
darwinssl certificate check bypass7.31.07.39.0CVE-2014-8151CWE-297: Improper Validation of Certificate with Host Mismatch
URL request injection6.07.39.0CVE-2014-8150CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')
duphandle read out of bounds7.17.17.38.0CVE-2014-3707CWE-126: Buffer Over-read
cookie leak for TLDs7.31.07.37.1CVE-2014-3620CWE-201: Information Exposure Through Sent Data
cookie leak with IP address as domain7.17.37.1CVE-2014-3613CWE-201: Information Exposure Through Sent Data
not verifying certs for TLS to IP address / Winssl7.26.07.35.0CVE-2014-2522CWE-297: Improper Validation of Certificate with Host Mismatch
not verifying certs for TLS to IP address / Darwinssl7.26.07.35.0CVE-2014-1263CWE-297: Improper Validation of Certificate with Host Mismatch
IP address wildcard certificate validation7.17.35.0CVE-2014-0139CWE-297: Improper Validation of Certificate with Host Mismatch
wrong re-use of connections7.10.77.35.0CVE-2014-0138CWE-305: Authentication Bypass by Primary Weakness
re-use of wrong HTTP NTLM connection7.10.67.34.0CVE-2014-0015CWE-305: Authentication Bypass by Primary Weakness

Changelog for curl 7.34.0

See vulnerability summary for the previous release: 7.33.0 or the subsequent release: 7.35.0