fkie_cve-2012-0036
Vulnerability from fkie_nvd
Published
2012-04-13 20:55
Modified
2025-04-11 00:51
Severity ?
Summary
curl and libcurl 7.2x before 7.24.0 do not properly consider special characters during extraction of a pathname from a URL, which allows remote attackers to conduct data-injection attacks via a crafted URL, as demonstrated by a CRLF injection attack on the (1) IMAP, (2) POP3, or (3) SMTP protocol.
References
secalert@redhat.comhttp://curl.haxx.se/curl-url-sanitize.patchPatch
secalert@redhat.comhttp://curl.haxx.se/docs/adv_20120124.htmlVendor Advisory
secalert@redhat.comhttp://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041
secalert@redhat.comhttp://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041
secalert@redhat.comhttp://lists.apple.com/archives/security-announce/2012/May/msg00001.html
secalert@redhat.comhttp://secunia.com/advisories/48256
secalert@redhat.comhttp://security.gentoo.org/glsa/glsa-201203-02.xml
secalert@redhat.comhttp://support.apple.com/kb/HT5281
secalert@redhat.comhttp://www.debian.org/security/2012/dsa-2398
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2012:058
secalert@redhat.comhttp://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
secalert@redhat.comhttp://www.securityfocus.com/bid/51665
secalert@redhat.comhttp://www.securitytracker.com/id/1032924
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=773457
secalert@redhat.comhttps://github.com/bagder/curl/commit/75ca568fa1c19de4c5358fed246686de8467c238
secalert@redhat.comhttps://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03760en_us
af854a3a-2127-422b-91ae-364da2661108http://curl.haxx.se/curl-url-sanitize.patchPatch
af854a3a-2127-422b-91ae-364da2661108http://curl.haxx.se/docs/adv_20120124.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041
af854a3a-2127-422b-91ae-364da2661108http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/48256
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-201203-02.xml
af854a3a-2127-422b-91ae-364da2661108http://support.apple.com/kb/HT5281
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2012/dsa-2398
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2012:058
af854a3a-2127-422b-91ae-364da2661108http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/51665
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1032924
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=773457
af854a3a-2127-422b-91ae-364da2661108https://github.com/bagder/curl/commit/75ca568fa1c19de4c5358fed246686de8467c238
af854a3a-2127-422b-91ae-364da2661108https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03760en_us
Impacted products
Vendor Product Version
curl curl 7.20.0
curl curl 7.20.1
curl curl 7.21.0
curl curl 7.21.1
curl curl 7.21.2
curl curl 7.21.3
curl curl 7.21.4
curl curl 7.21.5
curl curl 7.21.6
curl curl 7.21.7
curl curl 7.22.0
curl curl 7.23.0
curl curl 7.23.1
curl libcurl 7.20.0
curl libcurl 7.20.1
curl libcurl 7.21.0
curl libcurl 7.21.1
curl libcurl 7.21.2
curl libcurl 7.21.3
curl libcurl 7.21.4
curl libcurl 7.21.5
curl libcurl 7.21.6
curl libcurl 7.21.7
curl libcurl 7.22.0
curl libcurl 7.23.0
curl libcurl 7.23.1



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:curl:curl:7.20.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9BDFC51-3AB0-4C43-8979-ECA18E8035C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:curl:7.20.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3AC9C63-FD5E-4315-B9AF-9D8B1E988F98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:curl:7.21.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B05A4F5A-C65D-4662-8373-4FEA07558CBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:curl:7.21.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "85ADB9E1-0356-4E55-B7FD-6425EAF2C643",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:curl:7.21.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EBA4E51-1C4B-4C2A-B13E-11D4FD9C1C50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:curl:7.21.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A333EB08-4E37-41EF-A204-C82CECE9A51D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:curl:7.21.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E29638D1-2620-46A2-BE15-4706B7C4E678",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:curl:7.21.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA6D4422-C5C8-440F-B476-84DE445966DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:curl:7.21.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4506D93-8DBC-4E33-9432-C4A8CA3BDE6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:curl:7.21.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DADC1B7-2945-4CEC-A1D9-0CCA785F165D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:curl:7.22.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7CFA6F8-A6B1-415A-8DFB-EA4AFA67160E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:curl:7.23.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7C18D23-0401-41C2-BAD7-8B2965691EF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:curl:7.23.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A93EF4F2-101C-4FAD-A8F6-7A19EE2D6C8F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.20.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "34341428-2676-4431-A23F-65FBE90BAD3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.20.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0B31BF7-F04D-4985-A0F2-5206D678D3CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.21.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E2630C2-3E7C-4836-A548-819679967099",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.21.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "36FDE251-B1E1-4989-9ECB-07D4A760384E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.21.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E52D4877-8ED5-4057-A55D-5C5F82175737",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.21.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "77A81783-51FB-43F4-9D83-5E6134BADB08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.21.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "31022B8A-B4D6-4F6B-9643-1266A65A3807",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.21.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "6ACEDA5F-8B32-4898-A1B9-7FCC8110F54A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.21.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "24F20A9A-78F4-463B-A2C5-58721CE46210",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.21.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F4A1953-91D9-4B20-9A13-4974DA86683B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.22.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FFBF499-9028-4A50-B6FC-2B2D3AD7E9AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.23.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD5BCA31-3875-4585-8E42-8FAE354049A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.23.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AA5ADA7-629B-4028-A023-DF119527A522",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "curl and libcurl 7.2x before 7.24.0 do not properly consider special characters during extraction of a pathname from a URL, which allows remote attackers to conduct data-injection attacks via a crafted URL, as demonstrated by a CRLF injection attack on the (1) IMAP, (2) POP3, or (3) SMTP protocol."
    },
    {
      "lang": "es",
      "value": "curl y libcurl v7.2x anteriores v7.24.0 no consideran de forma adecuada los caracteres especiales cuando extraen una ruta de un fichero de una URL, lo que permite a atacantes remotos realizar ataques de injecci\u00f3n de datos mediente una URL manipulada, como se demostr\u00f3 mediante un atque de injecci\u00f3n CRLF  sobre los protocolos (1) IMAP, (2) POP3, y (3) SMTP."
    }
  ],
  "id": "CVE-2012-0036",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-04-13T20:55:01.493",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://curl.haxx.se/curl-url-sanitize.patch"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://curl.haxx.se/docs/adv_20120124.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.apple.com/archives/security-announce/2012/May/msg00001.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/48256"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://security.gentoo.org/glsa/glsa-201203-02.xml"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://support.apple.com/kb/HT5281"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2012/dsa-2398"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:058"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/51665"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securitytracker.com/id/1032924"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=773457"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://github.com/bagder/curl/commit/75ca568fa1c19de4c5358fed246686de8467c238"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03760en_us"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://curl.haxx.se/curl-url-sanitize.patch"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://curl.haxx.se/docs/adv_20120124.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.apple.com/archives/security-announce/2012/May/msg00001.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/48256"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-201203-02.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://support.apple.com/kb/HT5281"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2012/dsa-2398"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:058"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/51665"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1032924"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=773457"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://github.com/bagder/curl/commit/75ca568fa1c19de4c5358fed246686de8467c238"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03760en_us"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-89"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…