Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1575536 - (CVE-2018-1000301) CVE-2018-1000301 curl: Out-of-bounds heap read when missing RTSP headers allows information leak of denial of service
CVE-2018-1000301 curl: Out-of-bounds heap read when missing RTSP headers allo...
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20180516,repor...
: Security
Depends On: 1577001 1576996 1578682 1578683
Blocks: 1575537
  Show dependency treegraph
 
Reported: 2018-05-07 04:37 EDT by Adam Mariš
Modified: 2018-10-30 03:43 EDT (History)
23 users (show)

See Also:
Fixed In Version: curl 7.60.0
Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)
Upstream patch (1.46 KB, patch)
2018-05-07 04:45 EDT, Adam Mariš
no flags Details | Diff


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2018:3157 None None None 2018-10-30 03:43 EDT

  None (edit)
Description Adam Mariš 2018-05-07 04:37:41 EDT
curl can be tricked into reading data beyond the end of a heap based buffer
used to store downloaded content.

When servers send RTSP responses back to curl, the data starts out with a set
of headers. curl parses that data to separate it into a number of headers to
deal with those appropriately and to find the end of the headers that signal
the start of the "body" part.

The function that splits up the response into headers is called
`Curl_http_readwrite_headers()` and in situations where it can't find a single
header in the buffer, it might end up leaving a pointer pointing into the
buffer instead of to the start of the buffer which then later on may lead to
an out of buffer read when code assumes that pointer points to a full buffer
size worth of memory to use.

This could potentially lead to information leakage but most likely a
crash/denial of service for applications if a server triggers this flaw.

Introduced by following patches:

https://github.com/curl/curl/commit/b2ef79ef3d47b37
https://github.com/curl/curl/commit/bc4582b68a673d3

Affected versions: curl 7.20.0 to and including curl 7.59.0
Not affected versions: curl < 7.20.0 and curl >= 7.60.0
Comment 2 Adam Mariš 2018-05-07 04:45 EDT
Created attachment 1432530 [details]
Upstream patch
Comment 3 Adam Mariš 2018-05-07 04:53:00 EDT
Acknowledgments:

Name: the Curl project
Upstream: the OSS-fuzz project
Comment 6 Adam Mariš 2018-05-16 03:25:58 EDT
External References:

https://curl.haxx.se/docs/adv_2018-b138.html
Comment 7 Adam Mariš 2018-05-16 03:27:35 EDT
Created curl tracking bugs for this issue:

Affects: fedora-all [bug 1578683]
Comment 9 errata-xmlrpc 2018-10-30 03:43:45 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2018:3157 https://access.redhat.com/errata/RHSA-2018:3157

Note You need to log in before you can comment on or make changes to this bug.