Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:haxx:curl:7.26.0:*:*:*:*:*:*:*", "matchCriteriaId": "D204E994-4591-403C-8EF3-D3B7BF4AA1A6", "vulnerable": true}, {"criteria": "cpe:2.3:a:haxx:curl:7.27.0:*:*:*:*:*:*:*", "matchCriteriaId": "EBF5418D-1162-4B1E-BC3D-06A3E084BEFB", "vulnerable": true}, {"criteria": "cpe:2.3:a:haxx:curl:7.28.0:*:*:*:*:*:*:*", "matchCriteriaId": "1CA65F31-3D54-4F66-A0A3-2BD993FF38F7", "vulnerable": true}, {"criteria": "cpe:2.3:a:haxx:curl:7.28.1:*:*:*:*:*:*:*", "matchCriteriaId": "41ACC9FE-62FF-424B-B4B8-B033FEAF7686", "vulnerable": true}, {"criteria": "cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*", "matchCriteriaId": "F6AF544C-5F16-4434-B9FB-93B1B7318950", "vulnerable": true}, {"criteria": "cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*", "matchCriteriaId": "CBFD9ED9-2412-44AE-9C55-0ED03A121B23", "vulnerable": true}, {"criteria": "cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*", "matchCriteriaId": "67CCE31B-ABDA-4F32-BAF1-B1AD0664B3E2", "vulnerable": true}, {"criteria": "cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*", "matchCriteriaId": "9E66A332-ECD1-4452-B444-FB629022FDF0", "vulnerable": true}], "negate": false, "operator": "OR"}]}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "matchCriteriaId": "E2076871-2E80-4605-A470-A41C1A8EC7EE", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Stack-based buffer overflow in the Curl_sasl_create_digest_md5_message function in lib/curl_sasl.c in curl and libcurl 7.26.0 through 7.28.1, when negotiating SASL DIGEST-MD5 authentication, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long string in the realm parameter in a (1) POP3, (2) SMTP or (3) IMAP message."}, {"lang": "es", "value": "Desbordamiento de b\u00fafer basado en pila en la funci\u00f3n de curl_sasl_create_digest_md5_message de libcurl en lib/curl_sasl.c v7.26.0 hasta v7.28.1 a durante la negociaci\u00f3n de la autenticaci\u00f3n SASL DIGEST-MD5, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda de la aplicaci\u00f3n) y posiblemente ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de una cadena demasiado larga en el par\u00e1metro 'realm' en un mensaje (1) POP3, (2) SMTP o (3) IMAP."}], "id": "CVE-2013-0249", "lastModified": "2025-04-11T00:51:21.963", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2013-03-08T22:55:01.123", "references": [{"source": "secalert@redhat.com", "url": "http://blog.volema.com/curl-rce.html"}, {"source": "secalert@redhat.com", "tags": ["Vendor Advisory"], "url": "http://curl.haxx.se/docs/adv_20130206.html"}, {"source": "secalert@redhat.com", "url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html"}, {"source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-February/099140.html"}, {"source": "secalert@redhat.com", "url": "http://nakedsecurity.sophos.com/2013/02/10/anatomy-of-a-vulnerability-curl-web-download-toolkit-holed-by-authentication-bug/"}, {"source": "secalert@redhat.com", "url": "http://packetstormsecurity.com/files/120147/cURL-Buffer-Overflow.html"}, {"source": "secalert@redhat.com", "url": "http://packetstormsecurity.com/files/120170/Slackware-Security-Advisory-curl-Updates.html"}, {"source": "secalert@redhat.com", "tags": ["Exploit"], "url": "http://www.exploit-db.com/exploits/24487"}, {"source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"}, {"source": "secalert@redhat.com", "url": "http://www.osvdb.org/89988"}, {"source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/57842"}, {"source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id/1028093"}, {"source": "secalert@redhat.com", "tags": ["Vendor Advisory"], "url": "http://www.ubuntu.com/usn/USN-1721-1"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://blog.volema.com/curl-rce.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://curl.haxx.se/docs/adv_20130206.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-February/099140.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://nakedsecurity.sophos.com/2013/02/10/anatomy-of-a-vulnerability-curl-web-download-toolkit-holed-by-authentication-bug/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://packetstormsecurity.com/files/120147/cURL-Buffer-Overflow.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://packetstormsecurity.com/files/120170/Slackware-Security-Advisory-curl-Updates.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit"], "url": "http://www.exploit-db.com/exploits/24487"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/89988"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/57842"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1028093"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://www.ubuntu.com/usn/USN-1721-1"}], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-119"}], "source": "nvd@nist.gov", "type": "Primary"}]}