Search for vulnerabilities
Vulnerability details: VCID-9q2e-1vc3-aaae
Vulnerability ID VCID-9q2e-1vc3-aaae
Aliases CVE-2019-3823
Summary libcurl versions from 7.34.0 to before 7.64.0 are vulnerable to a heap out-of-bounds read in the code handling the end-of-response for SMTP. If the buffer passed to `smtp_endofresp()` isn't NUL terminated and contains no character ending the parsed number, and `len` is set to 5, then the `strtol()` call reads beyond the allocated buffer. The read contents will not be returned to the caller.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
generic_textual Low http://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-3823.html
rhas Important https://access.redhat.com/errata/RHSA-2019:1543
cvssv3 4.3 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3823.json
epss 0.00260 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.00260 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.00260 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.00260 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.00360 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.00360 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.00360 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.00360 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.00360 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.00360 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.00360 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.00360 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.00360 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.00360 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.00360 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.01198 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.01198 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.01198 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.01198 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.01198 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.01198 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.01198 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.01198 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.01198 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.01198 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.01198 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.01198 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.01198 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.01198 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.01198 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.01198 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.01198 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.01198 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.01198 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.01198 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.01198 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.01198 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.01198 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.01198 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.01198 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.01198 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.01198 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.01198 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.01198 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.01198 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.01198 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.01198 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.01198 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.01198 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.01198 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.01198 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.01198 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.01198 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.01198 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.01198 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.01198 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.01198 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.01198 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.01198 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.01198 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.01368 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.01368 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.01368 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.01368 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.01368 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.01368 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.01368 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.01368 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.01368 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.01368 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.01368 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.01368 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.01368 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.01368 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.01368 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.01368 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.01368 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.01368 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.01368 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.01368 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.01368 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.01368 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.01368 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.01368 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.01368 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.01368 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.01368 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.01368 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.01536 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.01536 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
epss 0.024 https://api.first.org/data/v1/epss?cve=CVE-2019-3823
rhbs low https://bugzilla.redhat.com/show_bug.cgi?id=1670256
generic_textual Low https://curl.haxx.se/docs/CVE-2019-3823.html
cvssv3.1 Low https://curl.se/docs/CVE-2019-3823.html
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16890
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3822
generic_textual Low https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3823
cvssv3 4.3 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv2 5.0 https://nvd.nist.gov/vuln/detail/CVE-2019-3823
cvssv3 7.5 https://nvd.nist.gov/vuln/detail/CVE-2019-3823
archlinux High https://security.archlinux.org/AVG-873
archlinux High https://security.archlinux.org/AVG-874
archlinux High https://security.archlinux.org/AVG-875
archlinux High https://security.archlinux.org/AVG-876
archlinux High https://security.archlinux.org/AVG-877
generic_textual Low https://ubuntu.com/security/notices/USN-3882-1
generic_textual Low https://usn.ubuntu.com/usn/usn-3882-1
cvssv3.1 9.8 https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
generic_textual LOW https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
cvssv3.1 5.9 https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
generic_textual MODERATE https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
Reference id Reference type URL
http://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-3823.html
https://access.redhat.com/errata/RHSA-2019:3701
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3823.json
https://api.first.org/data/v1/epss?cve=CVE-2019-3823
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3823
https://cert-portal.siemens.com/productcert/pdf/ssa-936080.pdf
https://curl.haxx.se/docs/CVE-2019-3823.html
https://curl.se/docs/CVE-2019-3823.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16890
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3822
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3823
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f@%3Cdevnull.infra.apache.org%3E
https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f%40%3Cdevnull.infra.apache.org%3E
https://security.gentoo.org/glsa/201903-03
https://security.netapp.com/advisory/ntap-20190315-0001/
https://ubuntu.com/security/notices/USN-3882-1
https://usn.ubuntu.com/3882-1/
https://usn.ubuntu.com/usn/usn-3882-1
https://www.debian.org/security/2019/dsa-4386
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
http://www.securityfocus.com/bid/106950
1670256 https://bugzilla.redhat.com/show_bug.cgi?id=1670256
ASA-201902-10 https://security.archlinux.org/ASA-201902-10
ASA-201902-11 https://security.archlinux.org/ASA-201902-11
ASA-201902-12 https://security.archlinux.org/ASA-201902-12
ASA-201902-13 https://security.archlinux.org/ASA-201902-13
ASA-201902-9 https://security.archlinux.org/ASA-201902-9
AVG-873 https://security.archlinux.org/AVG-873
AVG-874 https://security.archlinux.org/AVG-874
AVG-875 https://security.archlinux.org/AVG-875
AVG-876 https://security.archlinux.org/AVG-876
AVG-877 https://security.archlinux.org/AVG-877
cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_operations_monitor:3.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:3.4:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_operations_monitor:4.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:4.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:secure_global_desktop:5.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:secure_global_desktop:5.4:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:netapp:clustered_data_ontap:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netapp:clustered_data_ontap:*:*:*:*:*:*:*:*
CVE-2019-3823 https://nvd.nist.gov/vuln/detail/CVE-2019-3823
RHSA-2019:1543 https://access.redhat.com/errata/RHSA-2019:1543
No exploits are available.
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3823.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2019-3823
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2019-3823
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.64861
EPSS Score 0.00260
Published At Dec. 17, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.