CVE-2019-5436

A heap buffer overflow in the TFTP receiving code allows for DoS or arbitrary code execution in libcurl versions 7.19.4 through 7.64.1.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.8 HIGH
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
hackeroneCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 96%
VendorProductVersion
haxxlibcurl
7.19.4 ≤
𝑥
≤ 7.64.1
opensuseleap
15.0
opensuseleap
15.1
opensuseleap
42.3
debiandebian_linux
9.0
debiandebian_linux
10.0
f5traffix_signaling_delivery_controller
5.0.0 ≤
𝑥
≤ 5.1.0
netapphci_management_node
-
netappsolidfire
-
netappsteelstore_cloud_integrated_storage
-
oracleenterprise_manager_ops_center
12.3.3
oracleenterprise_manager_ops_center
12.4.0
oraclemysql_server
𝑥
≤ 5.7.27
oraclemysql_server
5.7.28 ≤
𝑥
≤ 8.0.17
oracleoss_support_tools
20.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
curl
bullseye
7.74.0-1.3+deb11u13
fixed
bullseye (security)
7.74.0-1.3+deb11u11
fixed
bookworm
7.88.1-10+deb12u7
fixed
bookworm (security)
7.88.1-10+deb12u5
fixed
sid
8.10.1-2
fixed
trixie
8.10.1-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
curl
disco
Fixed 7.64.0-2ubuntu1.1
released
cosmic
Fixed 7.61.0-1ubuntu2.4
released
bionic
Fixed 7.58.0-2ubuntu3.7
released
xenial
Fixed 7.47.0-1ubuntu2.13
released
trusty
Fixed 7.35.0-1ubuntu2.20+esm2
released
References