Vulnerability Details : CVE-2015-3145
The sanitize_cookie_path function in cURL and libcurl 7.31.0 through 7.41.0 does not properly calculate an index, which allows remote attackers to cause a denial of service (out-of-bounds write and crash) or possibly have other unspecified impact via a cookie path containing only a double-quote character.
Vulnerability category: OverflowDenial of service
Products affected by CVE-2015-3145
- cpe:2.3:a:hp:system_management_homepage:*:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.10.4:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.10.0:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.10.2:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.10.3:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.10.1:*:*:*:*:*:*:*
- cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:curl:7.32.0:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:curl:7.31.0:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:curl:7.35.0:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:curl:7.33.0:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:curl:7.34.0:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:curl:7.36.0:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:curl:7.37.0:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:curl:7.37.1:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:curl:7.38.0:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:curl:7.41.0:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:curl:7.39.0:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:curl:7.40.0:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.30.0:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.37.1:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.38.0:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.39:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.40.0:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:libcurl:7.41.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-3145
74.78%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 99 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-3145
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2015-3145
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-3145
-
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
CPU Oct 2018
-
https://security.gentoo.org/glsa/201509-02
cURL: Multiple vulnerabilities (GLSA 201509-02) — Gentoo security
-
http://curl.haxx.se/docs/adv_20150422C.html
curl - cookie parser out of boundary memory access - CVE-2015-3145Vendor Advisory
-
http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156250.html
[SECURITY] Fedora 20 Update: curl-7.32.0-20.fc20
-
http://www.securitytracker.com/id/1032232
libcurl Bugs Let Remote Users Deny Service and Execute Arbitrary Code - SecurityTrackerThird Party Advisory;VDB Entry
-
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763
HPSBMU03546 rev.1 - System Management Homepage on Windows and Linux, Multiple Remote VulnerabilitiesThird Party Advisory
-
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743
Juniper Networks - 2016-04 Security Bulletin: Junos: Multiple vulnerabilities in cURL and libcurl
-
https://support.apple.com/kb/HT205031
About the security content of OS X Yosemite v10.10.5 and Security Update 2015-006 - Apple SupportThird Party Advisory
-
http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157017.html
[SECURITY] Fedora 21 Update: curl-7.37.0-14.fc21Third Party Advisory
-
http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
Oracle Solaris Bulletin - January 2016Third Party Advisory
-
http://advisories.mageia.org/MGASA-2015-0179.html
Mageia Advisory: MGASA-2015-0179 - Updated curl packages fix security vulnerabilitiesThird Party Advisory
-
http://www.ubuntu.com/usn/USN-2591-1
USN-2591-1: curl vulnerabilities | Ubuntu security noticesThird Party Advisory
-
http://www.debian.org/security/2015/dsa-3232
Debian -- Security Information -- DSA-3232-1 curlThird Party Advisory
-
http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156945.html
[SECURITY] Fedora 22 Update: mingw-curl-7.42.0-1.fc22Third Party Advisory
-
http://www.securityfocus.com/bid/74303
cURL/libcURL CVE-2015-3145 Out of Bounds Read Denial of Service Vulnerability
-
http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155957.html
[SECURITY] Fedora 22 Update: curl-7.40.0-3.fc22Third Party Advisory
-
http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
Apple - Lists.apple.comThird Party Advisory
-
http://lists.opensuse.org/opensuse-updates/2015-04/msg00057.html
openSUSE-SU-2015:0799-1: moderate: Security update for curlThird Party Advisory
-
http://www.mandriva.com/security/advisories?name=MDVSA-2015:219
mandriva.comThird Party Advisory
-
http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157188.html
[SECURITY] Fedora 21 Update: mingw-curl-7.42.0-1.fc21Third Party Advisory
Jump to