Versio.io

CVE-2020-8285

Common vulnerabilities & exposures (CVE)

CVE databaseCVE database blogpostRelease & EoL database
 
Published at: - 14-12-2020 09:15
Last modified: - 13-05-2022 10:58
Total changes: - 17

Description

curl 7.21.0 to and including 7.73.0 is vulnerable to uncontrolled recursion due to a stack overflow issue in FTP wildcard match parsing.

Common Vulnerability Scoring System (CVSS)

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Low
Attack complexity
Network
Attack vector
High
Availability
None
Confidentiality
None
Integrity
None
Privileges required
Unchanged
Scope
None
User interaction
7.5
Base score
3.9
3.6
Exploitability score
Impact score
 

Verification logic

OR
OR
vendor=haxx AND product=libcurl AND versionStartIncluding=7.21.0 AND versionEndExcluding=7.74.0
OR
vendor=Debian AND product=debian_linux AND version=9.0
vendor=Debian AND product=debian_linux AND version=10.0
OR
vendor=fedoraproject AND product=fedora AND version=32
vendor=fedoraproject AND product=fedora AND version=33
OR
vendor=netapp AND product=clustered_data_ontap AND version=-
vendor=netapp AND product=solidfire AND version=-
vendor=netapp AND product=hci_management_node AND version=-
AND
OR
vendor=netapp AND product=hci_bootstrap_os AND version=-
OR
vendor=netapp AND product=hci_compute_node AND version=-
AND
OR
vendor=netapp AND product=hci_storage_node_firmware AND version=-
OR
vendor=netapp AND product=hci_storage_node AND version=-
OR
vendor=apple AND product=mac_os_x AND versionEndExcluding=10.14.6
vendor=apple AND product=mac_os_x AND versionStartIncluding=10.15 AND versionEndExcluding=10.15.7
vendor=apple AND product=mac_os_x AND version=10.14.6 AND update=security_update_2020-001
vendor=apple AND product=mac_os_x AND version=10.14.6 AND update=security_update_2020-002
vendor=apple AND product=mac_os_x AND version=10.14.6 AND update=security_update_2020-003
vendor=apple AND product=mac_os_x AND version=10.14.6 AND update=security_update_2020-004
vendor=apple AND product=mac_os_x AND version=10.14.6 AND update=security_update_2020-005
vendor=apple AND product=mac_os_x AND version=10.14.6 AND update=security_update_2020-006
vendor=apple AND product=mac_os_x AND version=10.14.6 AND update=-
vendor=apple AND product=mac_os_x AND version=10.15.7 AND update=supplemental_update
vendor=apple AND product=mac_os_x AND version=10.14.6 AND update=security_update_2019-001
vendor=apple AND product=mac_os_x AND version=10.14.6 AND update=security_update_2019-002
vendor=apple AND product=mac_os_x AND version=10.14.6 AND update=security_update_2020-007
vendor=apple AND product=mac_os_x AND version=10.14.6 AND update=security_update_2021-001
vendor=apple AND product=mac_os_x AND version=10.15.7 AND update=-
vendor=apple AND product=mac_os_x AND version=10.15.7 AND update=security_update_2020-001
vendor=apple AND product=mac_os_x AND version=10.15.7 AND update=security_update_2021-001
vendor=apple AND product=macos AND versionStartIncluding=11.0 AND versionEndExcluding=11.3
OR
vendor=oracle AND product=peoplesoft_enterprise_peopletools AND version=8.58
vendor=oracle AND product=communications_billing_and_revenue_management AND version=12.0.0.3.0
vendor=oracle AND product=essbase AND version=21.2
vendor=oracle AND product=communications_cloud_native_core_policy AND version=1.14.0
AND
OR
vendor=fujitsu AND product=m10-1_firmware AND versionEndExcluding=xcp2410
OR
vendor=fujitsu AND product=m10-1 AND version=-
AND
OR
vendor=fujitsu AND product=m10-4_firmware AND versionEndExcluding=xcp2410
OR
vendor=fujitsu AND product=m10-4 AND version=-
AND
OR
vendor=fujitsu AND product=m10-4s_firmware AND versionEndExcluding=xcp2410
OR
vendor=fujitsu AND product=m10-4s AND version=-
AND
OR
vendor=fujitsu AND product=m12-1_firmware AND versionEndExcluding=xcp2410
OR
vendor=fujitsu AND product=m12-1 AND version=-
AND
OR
vendor=fujitsu AND product=m12-2_firmware AND versionEndExcluding=xcp2410
OR
vendor=fujitsu AND product=m12-2 AND version=-
AND
OR
vendor=fujitsu AND product=m12-2s_firmware AND versionEndExcluding=xcp2410
OR
vendor=fujitsu AND product=m12-2s AND version=-
AND
OR
vendor=fujitsu AND product=m10-1_firmware AND versionEndExcluding=xcp3110
OR
vendor=fujitsu AND product=m10-1 AND version=-
AND
OR
vendor=fujitsu AND product=m10-4_firmware AND versionEndExcluding=xcp3110
OR
vendor=fujitsu AND product=m10-4 AND version=-
AND
OR
vendor=fujitsu AND product=m10-4s_firmware AND versionEndExcluding=xcp3110
OR
vendor=fujitsu AND product=m10-4s AND version=-
AND
OR
vendor=fujitsu AND product=m12-1_firmware AND versionEndExcluding=xcp3110
OR
vendor=fujitsu AND product=m12-1 AND version=-
AND
OR
vendor=fujitsu AND product=m12-2_firmware AND versionEndExcluding=xcp3110
OR
vendor=fujitsu AND product=m12-2 AND version=-
AND
OR
vendor=fujitsu AND product=m12-2s_firmware AND versionEndExcluding=xcp3110
OR
vendor=fujitsu AND product=m12-2s AND version=-
OR
vendor=siemens AND product=sinec_infrastructure_network_services AND versionEndExcluding=1.0.1.1
 

Reference

 


Keywords

NVD

 

CVE-2020-8285

 

CVE

 

Common vulnerabilities & exposures

 

CVSS

 

Common vulnerability scoring system

 

Security

 

Vulnerabilities

 

Exposures

 

We use cookies to ensure that we give you the best experience on our website. Read privacy policies for more information.