CVE Vulnerabilities

CVE-2020-8285

This vulnerability is marked as RESERVED by NVD. This means that the CVE-ID is reserved for future use by the CVE Numbering Authority (CNA) or a security researcher, but the details of it are not yet publicly available yet.

This page will reflect the classification results once they are available through NVD.

Any vendor information available is shown as below.

Redhat

CVE-2020-8285 curl: Malicious FTP server can trigger stack overflow when CURLOPT_CHUNK_BGN_FUNCTION is used

Mitigation

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Affected Software List

NameVendorVersion
JBoss Core Services for RHEL 8RedHat
JBoss Core Services on RHEL 7RedHat
Red Hat Enterprise Linux 8RedHatcurl-0:7.61.1-18.el8
Red Hat JBoss Core Services 1RedHat

Ubuntu

curl 7.21.0 to and including 7.73.0 is vulnerable to uncontrolled recursion due to a stack overflow issue in FTP wildcard match parsing.

Affected Software List

NameVendorVersion
CurlUbuntu/esm-infra/xenial7.47.0-1ubuntu2.18
CurlUbuntu/focal7.68.0-1ubuntu2.4
CurlUbuntu/trusty/esm7.35.0-1ubuntu2.20+esm6
CurlUbuntu/upstream7.74.0
CurlUbuntu/xenial7.47.0-1ubuntu2.18
CurlUbuntu/bionic7.58.0-2ubuntu3.12
CurlUbuntu/devel7.74.0-1ubuntu1
CurlUbuntu/groovy7.68.0-1ubuntu4.2
CurlUbuntu/precise/esm7.22.0-3ubuntu4.29
CurlUbuntu/trustyout of standard support