Curlsmtpescapeeob in lib/smtp.c in curl 7.54.1 to and including curl 7.60.0 has a heap-based buffer overflow that might be exploitable by an attacker who can control the data that curl transmits over SMTP with certain settings (i.e., use of a nonstandard --limit-rate argument or CURLOPTBUFFERSIZE value).
[
{
"digest": {
"line_hashes": [
"100346489179498015074596516711790345714",
"36398893905587497857396509459642227416",
"83528369294652915166766063052770479545",
"119381144070371804446013776337879380459",
"308943778265509870019894021240107613861",
"167054270400523215026863660412897532998",
"326483793231161323803805689795008028311",
"214925078150770847850926944304516077504",
"226951013112595546245203535799648872728"
],
"threshold": 0.9
},
"target": {
"file": "lib/smtp.c"
},
"source": "https://github.com/curl/curl/commit/ba1dbd78e5f1ed67c1b8d37ac89d90e5e330b628",
"id": "CVE-2018-0500-1da300f5",
"signature_version": "v1",
"deprecated": false,
"signature_type": "Line"
},
{
"digest": {
"length": 1560.0,
"function_hash": "220425643078242232243892256799210626195"
},
"target": {
"file": "lib/smtp.c",
"function": "Curl_smtp_escape_eob"
},
"source": "https://github.com/curl/curl/commit/ba1dbd78e5f1ed67c1b8d37ac89d90e5e330b628",
"id": "CVE-2018-0500-9a00892e",
"signature_version": "v1",
"deprecated": false,
"signature_type": "Function"
}
]