Attacker Value
Unknown
(0 users assessed)
Exploitability
Unknown
(0 users assessed)
User Interaction
Unknown
Privileges Required
Unknown
Attack Vector
Unknown
0

CVE-2015-3145

Disclosure Date: April 24, 2015
Add MITRE ATT&CK tactics and techniques that apply to this CVE.

Description

The sanitize_cookie_path function in cURL and libcurl 7.31.0 through 7.41.0 does not properly calculate an index, which allows remote attackers to cause a denial of service (out-of-bounds write and crash) or possibly have other unspecified impact via a cookie path containing only a double-quote character.

Add Assessment

No one has assessed this topic. Be the first to add your voice to the community.

CVSS V3 Severity and Metrics
Base Score:
None
Impact Score:
Unknown
Exploitability Score:
Unknown
Vector:
Unknown
Attack Vector (AV):
Unknown
Attack Complexity (AC):
Unknown
Privileges Required (PR):
Unknown
User Interaction (UI):
Unknown
Scope (S):
Unknown
Confidentiality (C):
Unknown
Integrity (I):
Unknown
Availability (A):
Unknown

General Information

Vendors

  • apple,
  • canonical,
  • debian,
  • fedoraproject,
  • haxx,
  • hp,
  • opensuse,
  • oracle

Products

  • curl 7.31.0,
  • curl 7.32.0,
  • curl 7.33.0,
  • curl 7.34.0,
  • curl 7.35.0,
  • curl 7.36.0,
  • curl 7.37.0,
  • curl 7.37.1,
  • curl 7.38.0,
  • curl 7.39.0,
  • curl 7.40.0,
  • curl 7.41.0,
  • debian linux 7.0,
  • fedora 21,
  • fedora 22,
  • libcurl 7.30.0,
  • libcurl 7.31.0,
  • libcurl 7.32.0,
  • libcurl 7.33.0,
  • libcurl 7.34.0,
  • libcurl 7.35.0,
  • libcurl 7.36.0,
  • libcurl 7.37.0,
  • libcurl 7.37.1,
  • libcurl 7.38.0,
  • libcurl 7.39,
  • libcurl 7.40.0,
  • libcurl 7.41.0,
  • mac os x 10.10.0,
  • mac os x 10.10.1,
  • mac os x 10.10.2,
  • mac os x 10.10.3,
  • mac os x 10.10.4,
  • opensuse 13.1,
  • opensuse 13.2,
  • solaris 11.3,
  • system management homepage,
  • ubuntu linux 12.04,
  • ubuntu linux 14.04,
  • ubuntu linux 14.10,
  • ubuntu linux 15.04

References

Additional Info

Technical Analysis