Stack-based buffer overflow in the Curl_sasl_create_digest_md5_message function in lib/curl_sasl.c in curl and libcurl 7.26.0 through 7.28.1, when negotiating SASL DIGEST-MD5 authentication, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long string in the realm parameter in a (1) POP3, (2) SMTP or (3) IMAP message.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T14:18:09.560Z
Reserved: 2012-12-06T00:00:00
Link: CVE-2013-0249

No data.

Status : Modified
Published: 2013-03-08T22:55:01.123
Modified: 2024-11-21T01:47:09.393
Link: CVE-2013-0249
