Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2013-0249

Stack-based buffer overflow in the Curl_sasl_create_digest_md5_message function in lib/curl_sasl.c in curl and libcurl 7.26.0 through 7.28.1, when negotiating SASL DIGEST-MD5 authentication, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long string in the realm parameter in a (1) POP3, (2) SMTP or (3) IMAP message.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.388
EPSS Ranking 97.1%
CVSS Severity
CVSS v2 Score 7.5
References
Products affected by CVE-2013-0249
  • Haxx » Curl » Version: 7.26.0
    cpe:2.3:a:haxx:curl:7.26.0
  • Haxx » Curl » Version: 7.27.0
    cpe:2.3:a:haxx:curl:7.27.0
  • Haxx » Curl » Version: 7.28.0
    cpe:2.3:a:haxx:curl:7.28.0
  • Haxx » Curl » Version: 7.28.1
    cpe:2.3:a:haxx:curl:7.28.1
  • Haxx » Libcurl » Version: 7.26.0
    cpe:2.3:a:haxx:libcurl:7.26.0
  • Haxx » Libcurl » Version: 7.27.0
    cpe:2.3:a:haxx:libcurl:7.27.0
  • Haxx » Libcurl » Version: 7.28.0
    cpe:2.3:a:haxx:libcurl:7.28.0
  • Haxx » Libcurl » Version: 7.28.1
    cpe:2.3:a:haxx:libcurl:7.28.1
  • Canonical » Ubuntu Linux » Version: 12.10
    cpe:2.3:o:canonical:ubuntu_linux:12.10


Contact Us

Shodan ® - All rights reserved