This vulnerability is marked as RESERVED by NVD. This means that the CVE-ID is reserved for future use by the CVE Numbering Authority (CNA) or a security researcher, but the details of it are not yet publicly available yet.
This page will reflect the classification results once they are available through NVD.
Any vendor information available is shown as below.
CVE-2020-8285 curl: Malicious FTP server can trigger stack overflow when CURLOPT_CHUNK_BGN_FUNCTION is used
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
|JBoss Core Services for RHEL 8||RedHat|
|JBoss Core Services on RHEL 7||RedHat|
|Red Hat Enterprise Linux 8||RedHat||curl-0:7.61.1-18.el8|
|Red Hat JBoss Core Services 1||RedHat|
curl 7.21.0 to and including 7.73.0 is vulnerable to uncontrolled recursion due to a stack overflow issue in FTP wildcard match parsing.
|Curl||Ubuntu/trusty||out of standard support|