### [CVE-2019-3823](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3823) ![](https://img.shields.io/static/v1?label=Product&message=curl&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-125&color=brighgreen) ### Description libcurl versions from 7.34.0 to before 7.64.0 are vulnerable to a heap out-of-bounds read in the code handling the end-of-response for SMTP. If the buffer passed to `smtp_endofresp()` isn't NUL terminated and contains no character ending the parsed number, and `len` is set to 5, then the `strtol()` call reads beyond the allocated buffer. The read contents will not be returned to the caller. ### POC #### Reference - http://www.securityfocus.com/bid/106950 - http://www.securityfocus.com/bid/106950 #### Github - https://github.com/KorayAgaya/TrivyWeb - https://github.com/Mohzeela/external-secret - https://github.com/siddharthraopotukuchi/trivy - https://github.com/simiyo/trivy - https://github.com/t31m0/Vulnerability-Scanner-for-Containers - https://github.com/umahari/security