Curlsmtpescapeeob in lib/smtp.c in curl 7.54.1 to and including curl 7.60.0 has a heap-based buffer overflow that might be exploitable by an attacker who can control the data that curl transmits over SMTP with certain settings (i.e., use of a nonstandard --limit-rate argument or CURLOPTBUFFERSIZE value).
{ "availability": "No subscription required", "binaries": [ { "binary_name": "curl", "binary_version": "7.58.0-2ubuntu3.2" }, { "binary_name": "curl-dbgsym", "binary_version": "7.58.0-2ubuntu3.2" }, { "binary_name": "libcurl3-gnutls", "binary_version": "7.58.0-2ubuntu3.2" }, { "binary_name": "libcurl3-gnutls-dbgsym", "binary_version": "7.58.0-2ubuntu3.2" }, { "binary_name": "libcurl3-nss", "binary_version": "7.58.0-2ubuntu3.2" }, { "binary_name": "libcurl3-nss-dbgsym", "binary_version": "7.58.0-2ubuntu3.2" }, { "binary_name": "libcurl4", "binary_version": "7.58.0-2ubuntu3.2" }, { "binary_name": "libcurl4-dbgsym", "binary_version": "7.58.0-2ubuntu3.2" }, { "binary_name": "libcurl4-doc", "binary_version": "7.58.0-2ubuntu3.2" }, { "binary_name": "libcurl4-gnutls-dev", "binary_version": "7.58.0-2ubuntu3.2" }, { "binary_name": "libcurl4-nss-dev", "binary_version": "7.58.0-2ubuntu3.2" }, { "binary_name": "libcurl4-openssl-dev", "binary_version": "7.58.0-2ubuntu3.2" } ] }