Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux

CVE-2012-0036
CVE information
Published
Last Modified
CVSSv2.0 Severity
Impact Analysis
Description
curl and libcurl 7.2x before 7.24.0 do not properly consider special characters during extraction of a pathname from a URL, which allows remote attackers to conduct data-injection attacks via a crafted URL, as demonstrated by a CRLF injection attack on the (1) IMAP, (2) POP3, or (3) SMTP protocol..
CVSSv2.0 Score
- Severity
- High
- Base Score
- 7.5/10
- Exploit Score
- 10/10
- Access Vector
- Network
- Access Complexity
- Low
- Authentication Required
- None
- Impact Score
- 6.4/10
- Confidentiality Impact
- Partial
- Availability Impact
- Partial
- Integrity Impact
- Partial
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:a:curl:curl:7.21.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:curl:curl:7.21.6:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:curl:curl:7.21.3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:curl:curl:7.23.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:curl:curl:7.21.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:curl:curl:7.21.5:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:curl:curl:7.20.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:curl:curl:7.21.7:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:curl:curl:7.22.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:curl:curl:7.20.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:curl:curl:7.21.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:curl:curl:7.21.4:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:curl:curl:7.23.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:curl:libcurl:7.21.3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:curl:libcurl:7.21.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:curl:libcurl:7.21.6:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:curl:libcurl:7.20.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:curl:libcurl:7.21.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:curl:libcurl:7.22.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:curl:libcurl:7.20.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:curl:libcurl:7.21.5:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:curl:libcurl:7.21.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:curl:libcurl:7.23.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:curl:libcurl:7.21.4:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:curl:libcurl:7.21.7:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:curl:libcurl:7.23.0:*:*:*:*:*:*:* |
Yes
|
- | - |
References
- https://bugzilla.redhat.com/show_bug.cgi?id=773457
- http://curl.haxx.se/curl-url-sanitize.patch
- https://github.com/bagder/curl/commit/75ca568fa1c19de4c5358fed246686de8467c238
- http://curl.haxx.se/docs/adv_20120124.html
- http://support.apple.com/kb/HT5281
- http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.securityfocus.com/bid/51665
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf
- http://www.securitytracker.com/id/1032924
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:058
- http://security.gentoo.org/glsa/glsa-201203-02.xml
- http://secunia.com/advisories/48256
- http://www.debian.org/security/2012/dsa-2398