curl / Docs / Vulnerability table / 7.58.0 vulnerabilities

Vulnerabilities in curl 7.58.0

curl version 7.58.0 was released on January 24 2018. The following 12 security problems are known to exist in this version.

FlawFrom versionTo and includingCVECWE
NTLM type-2 out-of-bounds buffer read7.36.07.63.0CVE-2018-16890CWE-125: Out-of-bounds Read
NTLMv2 type-3 header stack buffer overflow7.36.07.63.0CVE-2019-3822CWE-121: Stack-based Buffer Overflow
SMTP end-of-response out-of-bounds read7.34.07.63.0CVE-2019-3823CWE-125: Out-of-bounds Read
warning message out-of-buffer read7.14.17.61.1CVE-2018-16842CWE-125: Out-of-bounds Read
SASL password overflow via integer overflow7.33.07.61.1CVE-2018-16839CWE-131: Incorrect Calculation of Buffer Size
NTLM password overflow via integer overflow7.15.47.61.0CVE-2018-14618CWE-131: Incorrect Calculation of Buffer Size
SMTP send heap buffer overflow7.54.17.60.0CVE-2018-0500CWE-122: Heap-based Buffer Overflow
FTP shutdown response buffer overflow7.54.17.59.0CVE-2018-1000300CWE-122: Heap-based Buffer Overflow
RTSP bad headers buffer over-read7.20.07.59.0CVE-2018-1000301CWE-126: Buffer Over-read
RTSP RTP buffer over-read7.20.07.58.0CVE-2018-1000122CWE-126: Buffer Over-read
LDAP NULL pointer dereference7.21.07.58.0CVE-2018-1000121CWE-476: NULL Pointer Dereference
FTP path trickery leads to NIL byte out of bounds write7.12.37.58.0CVE-2018-1000120CWE-122: Heap-based Buffer Overflow

Changelog for curl 7.58.0

See vulnerability summary for the previous release: 7.57.0 or the subsequent release: 7.59.0