CVE-2018-0500

Source
https://cve.org/CVERecord?id=CVE-2018-0500
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-0500.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2018-0500
Aliases
Downstream
Related
Published
2018-07-11T13:29:00.317Z
Modified
2026-03-15T22:17:08.949369Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Curlsmtpescapeeob in lib/smtp.c in curl 7.54.1 to and including curl 7.60.0 has a heap-based buffer overflow that might be exploitable by an attacker who can control the data that curl transmits over SMTP with certain settings (i.e., use of a nonstandard --limit-rate argument or CURLOPTBUFFERSIZE value).

References

Affected packages

Git / github.com/curl/curl

Affected ranges

Type
GIT
Repo
https://github.com/curl/curl
Events
Database specific
{
    "versions": [
        {
            "introduced": "7.54.1"
        },
        {
            "last_affected": "7.60.0"
        }
    ]
}

Affected versions

Other
curl-7_54_1
curl-7_55_0
curl-7_55_1
curl-7_56_0
curl-7_56_1
curl-7_57_0
curl-7_58_0
curl-7_59_0
curl-7_60_0

Database specific

vanir_signatures
[
    {
        "signature_version": "v1",
        "source": "https://github.com/curl/curl/commit/ba1dbd78e5f1ed67c1b8d37ac89d90e5e330b628",
        "signature_type": "Line",
        "deprecated": false,
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "100346489179498015074596516711790345714",
                "36398893905587497857396509459642227416",
                "83528369294652915166766063052770479545",
                "119381144070371804446013776337879380459",
                "308943778265509870019894021240107613861",
                "167054270400523215026863660412897532998",
                "326483793231161323803805689795008028311",
                "214925078150770847850926944304516077504",
                "226951013112595546245203535799648872728"
            ]
        },
        "id": "CVE-2018-0500-1da300f5",
        "target": {
            "file": "lib/smtp.c"
        }
    },
    {
        "signature_version": "v1",
        "source": "https://github.com/curl/curl/commit/ba1dbd78e5f1ed67c1b8d37ac89d90e5e330b628",
        "signature_type": "Function",
        "deprecated": false,
        "digest": {
            "function_hash": "220425643078242232243892256799210626195",
            "length": 1560.0
        },
        "id": "CVE-2018-0500-9a00892e",
        "target": {
            "function": "Curl_smtp_escape_eob",
            "file": "lib/smtp.c"
        }
    }
]
source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-0500.json"
unresolved_ranges
[
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "last_affected": "17.10"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "last_affected": "18.04"
            }
        ]
    }
]