Stack-based buffer overflow in the Curl_sasl_create_digest_md5_message function in lib/curl_sasl.c in curl and libcurl 7.26.0 through 7.28.1, when negotiating SASL DIGEST-MD5 authentication, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long string in the realm parameter in a (1) POP3, (2) SMTP or (3) IMAP message.
2013-03-08T22:55:01.123
2025-04-11T00:51:21.963
Deferred
CVSSv2: 7.5 (HIGH)
AV:N/AC:L/Au:N/C:P/I:P/A:P
10.0
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | haxx | curl | 7.26.0 | Yes |
Application | haxx | curl | 7.27.0 | Yes |
Application | haxx | curl | 7.28.0 | Yes |
Application | haxx | curl | 7.28.1 | Yes |
Application | haxx | libcurl | 7.26.0 | Yes |
Application | haxx | libcurl | 7.27.0 | Yes |
Application | haxx | libcurl | 7.28.0 | Yes |
Application | haxx | libcurl | 7.28.1 | Yes |
Operating System | canonical | ubuntu_linux | 12.10 | Yes |