The curl_easy_duphandle function in libcurl 7.17.1 through 7.38.0, when running with the CURLOPT_COPYPOSTFIELDS option, does not properly copy HTTP POST data for an easy handle, which triggers an out-of-bounds read that allows remote web servers to read sensitive memory information.

Subscriptions

Vendors Products
Mac Os X Subscribe
Canonical Subscribe
Ubuntu Linux Subscribe
Debian Linux Subscribe
Libcurl Subscribe
Opensuse Subscribe
Opensuse Subscribe
Hyperion Subscribe
Enterprise Linux Subscribe

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-84-1 curl security update
Debian DSA Debian DSA DSA-3069-1 curl security update
EUVD EUVD EUVD-2014-3653 The curl_easy_duphandle function in libcurl 7.17.1 through 7.38.0, when running with the CURLOPT_COPYPOSTFIELDS option, does not properly copy HTTP POST data for an easy handle, which triggers an out-of-bounds read that allows remote web servers to read sensitive memory information.
Ubuntu USN Ubuntu USN USN-2399-1 curl vulnerability
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-06T10:50:17.972Z

Reserved: 2014-05-14T00:00:00.000Z

Link: CVE-2014-3707

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2014-11-15T20:59:00.140

Modified: 2025-04-12T10:46:40.837

Link: CVE-2014-3707

cve-icon Redhat

Severity : Moderate

Publid Date: 2014-11-05T00:00:00Z

Links: CVE-2014-3707 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses