Bug 1553398 (CVE-2018-1000122)

Summary: CVE-2018-1000122 curl: RTSP RTP buffer over-read
Product: [Other] Security Response Reporter: Pedro Sampaio <psampaio>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: bgollahe, bodavis, csutherl, dbhole, erik-fedora, gzaronik, hhorak, java-maint, jclere, john.j5live, jorton, kanderso, kdudka, lzachar, mbabacek, mike, mturk, omajid, paul, rwagner, security-response-team, sisharma, slawomir, twalsh
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: curl 7.59.0 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-06-10 10:17:20 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1555207, 1555208, 1555209, 1555210, 1555221, 1565032, 1802792, 1802793    
Bug Blocks: 1552634    
Attachments:
Description Flags
upstream patch none

Description Pedro Sampaio 2018-03-08 19:29:14 UTC
curl can be tricked into copying data beyond end of its heap based buffer.

When asked to transfer an RTSP URL, curl could calculate a wrong data length
to copy from the read buffer. The memcpy call would copy data from the heap
following the buffer to a storage area that would subsequently be delivered to
the application (if it didn't cause a crash). We've managed to get it to reach
several hundreds bytes out of range.

This could lead to information leakage or a denial of service for the
application if the server offering the RTSP data can trigger this.

Comment 2 Pedro Sampaio 2018-03-08 19:38:47 UTC
Created attachment 1405982 [details]
upstream patch

Comment 3 Adam Mariš 2018-03-14 07:29:27 UTC
Acknowledgments:

Name: the Curl project
Upstream: Max Dymond

Comment 4 Adam Mariš 2018-03-14 07:29:38 UTC
External References:

https://curl.haxx.se/docs/adv_2018-b047.html

Comment 5 Adam Mariš 2018-03-14 07:34:04 UTC
Created mingw-curl tracking bugs for this issue:

Affects: fedora-all [bug 1555207]


Created curl tracking bugs for this issue:

Affects: fedora-all [bug 1555209]


Created mingw-curl tracking bugs for this issue:

Affects: epel-7 [bug 1555208]

Comment 8 Cedric Buissart 2018-03-14 09:56:47 UTC
Upstream fix:
 readwrite: make sure excess reads don't go beyond buffer end
https://github.com/curl/curl/commit/d52dc4760f

Comment 12 errata-xmlrpc 2018-10-30 07:43:27 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2018:3157 https://access.redhat.com/errata/RHSA-2018:3157

Comment 13 errata-xmlrpc 2018-11-13 08:35:26 UTC
This issue has been addressed in the following products:

  Red Hat Software Collections for Red Hat Enterprise Linux 6
  Red Hat Software Collections for Red Hat Enterprise Linux 7
  Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 7.5 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUS

Via RHSA-2018:3558 https://access.redhat.com/errata/RHSA-2018:3558

Comment 14 errata-xmlrpc 2019-06-18 19:09:08 UTC
This issue has been addressed in the following products:

  JBoss Core Services Apache HTTP Server 2.4.29 SP2

Via RHSA-2019:1543 https://access.redhat.com/errata/RHSA-2019:1543

Comment 17 errata-xmlrpc 2020-02-18 14:44:01 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7.5 Extended Update Support

Via RHSA-2020:0544 https://access.redhat.com/errata/RHSA-2020:0544

Comment 18 errata-xmlrpc 2020-02-25 12:11:34 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7.4 Advanced Update Support
  Red Hat Enterprise Linux 7.4 Update Services for SAP Solutions
  Red Hat Enterprise Linux 7.4 Telco Extended Update Support

Via RHSA-2020:0594 https://access.redhat.com/errata/RHSA-2020:0594