The sanitize_cookie_path function in cURL and libcurl 7.31.0 through 7.41.0 does not properly calculate an index, which allows remote attackers to cause a denial of service (out-of-bounds write and crash) or possibly have other unspecified impact via a cookie path containing only a double-quote character.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-3232-1 | curl security update |
Ubuntu USN |
USN-2591-1 | curl vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T05:39:30.959Z
Reserved: 2015-04-10T00:00:00
Link: CVE-2015-3145
No data.
Status : Deferred
Published: 2015-04-24T14:59:10.157
Modified: 2025-04-12T10:46:40.837
Link: CVE-2015-3145
OpenCVE Enrichment
No data.
Debian DSA
Ubuntu USN