CVE-2012-0036

curl and libcurl 7.2x before 7.24.0 do not properly consider special characters during extraction of a pathname from a URL, which allows remote attackers to conduct data-injection attacks via a crafted URL, as demonstrated by a CRLF injection attack on the (1) IMAP, (2) POP3, or (3) SMTP protocol.
SQL Injection
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 91%
VendorProductVersion
curlcurl
7.20.0
curlcurl
7.20.1
curlcurl
7.21.0
curlcurl
7.21.1
curlcurl
7.21.2
curlcurl
7.21.3
curlcurl
7.21.4
curlcurl
7.21.5
curlcurl
7.21.6
curlcurl
7.21.7
curlcurl
7.22.0
curlcurl
7.23.0
curlcurl
7.23.1
curllibcurl
7.20.0
curllibcurl
7.20.1
curllibcurl
7.21.0
curllibcurl
7.21.1
curllibcurl
7.21.2
curllibcurl
7.21.3
curllibcurl
7.21.4
curllibcurl
7.21.5
curllibcurl
7.21.6
curllibcurl
7.21.7
curllibcurl
7.22.0
curllibcurl
7.23.0
curllibcurl
7.23.1
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
curl
bullseye
7.74.0-1.3+deb11u13
fixed
lenny
not-affected
bullseye (security)
7.74.0-1.3+deb11u11
fixed
bookworm
7.88.1-10+deb12u7
fixed
bookworm (security)
7.88.1-10+deb12u5
fixed
sid
8.10.1-2
fixed
trixie
8.10.1-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
curl
oneiric
Fixed 7.21.6-3ubuntu3.2
released
natty
Fixed 7.21.3-1ubuntu1.5
released
maverick
Fixed 7.21.0-1ubuntu1.3
released
lucid
not-affected
hardy
not-affected
References