Executive Summary
curl version curl 7.20.0 to and including curl 7.59.0 contains a CWE-126: Buffer Over-read vulnerability in denial of service that can result in curl can be tricked into reading data beyond the end of a heap based buffer used to store downloaded RTSP content.. This vulnerability appears to have been fixed in curl < 7.20.0 and curl >= 7.60.0.
Why It Matters
CVE-2018-1000301 is rated CRITICAL severity, requiring immediate attention from security teams.
CVSS Base Score: 9.1/10
EPSS (Exploit Prediction): 2.8% probability of exploitation in the next 30 days.
Affected Technologies
Vendors: debian, canonical, haxx, redhat, oracle
Products: debian_linux, ubuntu_linux, curl, enterprise_linux_desktop, enterprise_linux_server, enterprise_linux_workstation, communications_webrtc_session_controller, enterprise_manager_ops_center, peoplesoft_enterprise_peopletools
🛡️What Defenders Should Check
Use Vulnios to continuously monitor your exposure to CVE-2018-1000301 and similar vulnerabilities.
References & Sources
AI Security Advisor
Powered by Gemini
Get AI-powered security recommendations tailored to this specific threat — including risk assessment, detection guidance, MITRE ATT&CK mapping, and actionable remediation steps.
Affected Products
Sources
Protect Your Organization
Monitor CVEs, scan for vulnerabilities, and get real-time threat alerts — all in one platform.
Get instant alerts on Telegram
Join our public channel for real-time critical CVE alerts.
Follow @vulnios