Curlsmtpescapeeob in lib/smtp.c in curl 7.54.1 to and including curl 7.60.0 has a heap-based buffer overflow that might be exploitable by an attacker who can control the data that curl transmits over SMTP with certain settings (i.e., use of a nonstandard --limit-rate argument or CURLOPTBUFFERSIZE value).
{ "vanir_signatures": [ { "id": "CVE-2018-0500-1da300f5", "digest": { "line_hashes": [ "100346489179498015074596516711790345714", "36398893905587497857396509459642227416", "83528369294652915166766063052770479545", "119381144070371804446013776337879380459", "308943778265509870019894021240107613861", "167054270400523215026863660412897532998", "326483793231161323803805689795008028311", "214925078150770847850926944304516077504", "226951013112595546245203535799648872728" ], "threshold": 0.9 }, "signature_version": "v1", "source": "https://github.com/curl/curl/commit/ba1dbd78e5f1ed67c1b8d37ac89d90e5e330b628", "target": { "file": "lib/smtp.c" }, "deprecated": false, "signature_type": "Line" }, { "id": "CVE-2018-0500-9a00892e", "digest": { "length": 1560.0, "function_hash": "220425643078242232243892256799210626195" }, "signature_version": "v1", "source": "https://github.com/curl/curl/commit/ba1dbd78e5f1ed67c1b8d37ac89d90e5e330b628", "target": { "function": "Curl_smtp_escape_eob", "file": "lib/smtp.c" }, "deprecated": false, "signature_type": "Function" } ] }