Description
The fix_hostname function in cURL and libcurl 7.37.0 through 7.41.0 does not properly calculate an index, which allows remote attackers to cause a denial of service (out-of-bounds read or write and crash) or possibly have other unspecified impact via a zero-length host name, as demonstrated by "http://:80" and ":80."
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-3232-1 | curl security update |
EUVD |
EUVD-2015-3225 | The fix_hostname function in cURL and libcurl 7.37.0 through 7.41.0 does not properly calculate an index, which allows remote attackers to cause a denial of service (out-of-bounds read or write and crash) or possibly have other unspecified impact via a zero-length host name, as demonstrated by "http://:80" and ":80." |
Ubuntu USN |
USN-2591-1 | curl vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T05:39:31.551Z
Reserved: 2015-04-10T00:00:00.000Z
Link: CVE-2015-3144
No data.
Status : Modified
Published: 2015-04-24T14:59:09.203
Modified: 2026-05-06T22:30:45.220
Link: CVE-2015-3144
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Ubuntu USN