A heap-based buffer overflow in cURL might allow remote attackers to execute arbitrary code.
Package | net-misc/curl on all architectures |
---|---|
Affected versions | < 7.61.0 |
Unaffected versions | >= 7.61.0 |
A command line tool and library for transferring data with URLs.
A heap-based buffer overflow was discovered in cURL’s Curl_smtp_escape_eob() function.
An attacker could cause a Denial of Service condition or execute arbitrary code via SMTP connections.
There is no known workaround at this time.
All cURL users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/curl-7.61.0"
Release date
July 29, 2018
Latest revision
July 29, 2018: 1
Severity
normal
Exploitable
remote
Bugzilla entries