{"id":"CVE-2018-1000301","details":"curl version curl 7.20.0 to and including curl 7.59.0 contains a CWE-126: Buffer Over-read vulnerability in denial of service that can result in curl can be tricked into reading data beyond the end of a heap based buffer used to store downloaded RTSP content.. This vulnerability appears to have been fixed in curl \u003c 7.20.0 and curl \u003e= 7.60.0.","aliases":["CURL-CVE-2018-1000301"],"modified":"2026-05-15T12:03:37.901501232Z","published":"2018-05-24T13:29:01.383Z","related":["SUSE-SU-2018:1327-1","SUSE-SU-2018:1327-2","SUSE-SU-2018:1478-1","openSUSE-SU-2024:10582-1"],"database_specific":{"unresolved_ranges":[{"source":"CPE_FIELD","cpes":["cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*","cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*","cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"],"extracted_events":[{"last_affected":"12.04"},{"last_affected":"14.04"},{"last_affected":"16.04"},{"last_affected":"17.10"},{"last_affected":"18.04"}],"vendor_product":"canonical:ubuntu_linux"},{"source":"CPE_FIELD","cpes":["cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"],"extracted_events":[{"last_affected":"7.0"},{"last_affected":"8.0"},{"last_affected":"9.0"}],"vendor_product":"debian:debian_linux"},{"source":"CPE_FIELD","cpes":["cpe:2.3:a:oracle:communications_webrtc_session_controller:*:*:*:*:*:*:*:*"],"extracted_events":[{"fixed":"7.2"}],"vendor_product":"oracle:communications_webrtc_session_controller"},{"source":"CPE_FIELD","cpes":["cpe:2.3:a:oracle:enterprise_manager_ops_center:12.2.2:*:*:*:*:*:*:*","cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*"],"extracted_events":[{"last_affected":"12.2.2"},{"last_affected":"12.3.3"}],"vendor_product":"oracle:enterprise_manager_ops_center"},{"source":"CPE_FIELD","cpes":["cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.55:*:*:*:*:*:*:*","cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.56:*:*:*:*:*:*:*","cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*"],"extracted_events":[{"last_affected":"8.55"},{"last_affected":"8.56"},{"last_affected":"8.57"}],"vendor_product":"oracle:peoplesoft_enterprise_peopletools"},{"source":"CPE_FIELD","cpes":["cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"],"extracted_events":[{"last_affected":"7.0"}],"vendor_product":"redhat:enterprise_linux_desktop"},{"source":"CPE_FIELD","cpes":["cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"],"extracted_events":[{"last_affected":"7.0"}],"vendor_product":"redhat:enterprise_linux_server"},{"source":"CPE_FIELD","cpes":["cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"],"extracted_events":[{"last_affected":"7.0"}],"vendor_product":"redhat:enterprise_linux_workstation"}]},"references":[{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/104225"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1040931"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHBA-2019:0327"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:3157"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:3558"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2020:0544"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2020:0594"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2018/05/msg00010.html"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201806-05"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3598-2/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3648-1/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2018/dsa-4202"},{"type":"ADVISORY","url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"},{"type":"FIX","url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"},{"type":"FIX","url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"},{"type":"FIX","url":"https://curl.haxx.se/docs/adv_2018-b138.html"},{"type":"FIX","url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"}]}