CVE-2019-5436
Severity
7.8HIGH
EPSS
13.3%
top 5.84%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 28
Latest updateMay 24
Description
A heap buffer overflow in the TFTP receiving code allows for DoS or arbitrary code execution in libcurl versions 7.19.4 through 7.64.1.
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9
Affected Packages9 packages
Also affects: Debian Linux 10.0, 9.0, Fedora 29
Patches
🔴Vulnerability Details
5GHSA▶
GHSA-8xvc-p9x4-w7jm: A heap buffer overflow in the TFTP receiving code allows for DoS or arbitrary code execution in libcurl versions 7↗2022-05-24
OSV▶
CVE-2019-5436: A heap buffer overflow in the TFTP receiving code allows for DoS or arbitrary code execution in libcurl versions 7↗2019-05-28
CVEList▶
CVE-2019-5436: A heap buffer overflow in the TFTP receiving code allows for DoS or arbitrary code execution in libcurl versions 7↗2019-05-28
📋Vendor Advisories
4💬Community
4Bugzilla▶
CVE-2019-5436 curl: TFTP receive heap buffer overflow in tftp_receive_packet() function [fedora-all]↗2019-05-22
Bugzilla
▶