CVE-2019-5436

EUVD-2019-15026
A heap buffer overflow in the TFTP receiving code allows for DoS or arbitrary code execution in libcurl versions 7.19.4 through 7.64.1.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.8 HIGH
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 94%
Affected Products (NVD)
VendorProductVersion
haxxlibcurl
7.19.4 ≤
𝑥
≤ 7.64.1
opensuseleap
15.0
opensuseleap
15.1
opensuseleap
42.3
debiandebian_linux
9.0
debiandebian_linux
10.0
f5traffix_signaling_delivery_controller
5.0.0 ≤
𝑥
≤ 5.1.0
netapphci_management_node
-
netappsolidfire
-
netappsteelstore_cloud_integrated_storage
-
oracleenterprise_manager_ops_center
12.3.3
oracleenterprise_manager_ops_center
12.4.0
oraclemysql_server
𝑥
≤ 5.7.27
oraclemysql_server
5.7.28 ≤
𝑥
≤ 8.0.17
oracleoss_support_tools
20.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
curl
bookworm
7.88.1-10+deb12u7
fixed
bookworm (security)
7.88.1-10+deb12u5
fixed
bullseye
7.74.0-1.3+deb11u13
fixed
bullseye (security)
7.74.0-1.3+deb11u11
fixed
sid
8.10.1-2
fixed
trixie
8.10.1-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
curl
bionic
Fixed 7.58.0-2ubuntu3.7
released
cosmic
Fixed 7.61.0-1ubuntu2.4
released
disco
Fixed 7.64.0-2ubuntu1.1
released
trusty
Fixed 7.35.0-1ubuntu2.20+esm2
released
xenial
Fixed 7.47.0-1ubuntu2.13
released
References