{"id":"CVE-2018-1000005","details":"libcurl 7.49.0 to and including 7.57.0 contains an out bounds read in code handling HTTP/2 trailers. It was reported (https://github.com/curl/curl/pull/2231) that reading an HTTP/2 trailer could mess up future trailers since the stored size was one byte less than required. The problem is that the code that creates HTTP/1-like headers from the HTTP/2 trailer data once appended a string like `:` to the target buffer, while this was recently changed to `: ` (a space was added after the colon) but the following math wasn't updated correspondingly. When accessed, the data is read out of bounds and causes either a crash or that the (too large) data gets passed to client write. This could lead to a denial-of-service situation or an information disclosure if someone has a service that echoes back or uses the trailers for something.","aliases":["CURL-CVE-2018-1000005"],"modified":"2026-04-16T06:16:36.776943470Z","published":"2018-01-24T22:29:00.307Z","related":["openSUSE-SU-2024:10582-1"],"references":[{"type":"ADVISORY","url":"https://usn.ubuntu.com/3554-1/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2018/dsa-4098"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1040273"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:1543"},{"type":"FIX","url":"https://curl.haxx.se/docs/adv_2018-824a.html"},{"type":"FIX","url":"https://github.com/curl/curl/pull/2231"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/curl/curl","events":[{"introduced":"67fe54d918a3b42a24cb7f5db81514c10e239735"},{"last_affected":"62c07b5743490ce373910f469abc8cdc759bec2b"},{"introduced":"0"},{"last_affected":"47ccaa4218c408e70671a2fa9caaa3caf8c1a877"}],"database_specific":{"versions":[{"introduced":"7.49.0"},{"last_affected":"7.57.0"},{"introduced":"0"},{"last_affected":"8.0"}]}}],"versions":["curl-7_49_0","curl-7_49_1","curl-7_50_0","curl-7_50_1","curl-7_50_2","curl-7_50_3","curl-7_51_0","curl-7_52_0","curl-7_52_1","curl-7_53_0","curl-7_53_1","curl-7_54_0","curl-7_54_1","curl-7_55_0","curl-7_55_1","curl-7_56_0","curl-7_56_1","curl-7_57_0","curl-7_58_0","curl-7_59_0","curl-7_60_0","curl-7_61_0","curl-7_61_1","curl-7_62_0","curl-7_63_0","curl-7_64_0","curl-7_64_1","curl-7_65_0","curl-7_65_1","curl-7_65_2","curl-7_65_3","curl-7_66_0","curl-7_67_0","curl-7_68_0","curl-7_69_0","curl-7_69_1","curl-7_70_0","curl-7_71_0","curl-7_71_1","curl-7_72_0","curl-7_73_0","curl-7_74_0","curl-7_75_0","curl-7_76_0","curl-7_76_1","curl-7_77_0","curl-7_78_0","curl-7_79_0","curl-7_79_1","curl-7_80_0","curl-7_81_0","curl-7_82_0","curl-7_83_0","curl-7_83_1","curl-7_84_0","curl-7_85_0","curl-7_86_0","curl-7_87_0","curl-7_88_0","curl-7_88_1","curl-8_0_0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-1000005.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"14.04"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"17.10"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"}]}