<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:cpe="http://cpe.mitre.org/language/2.0" xmlns:cvrf="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf" xmlns:cvrf-common="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/common" xmlns:cvssv2="http://scap.nist.gov/schema/cvss-v2/1.0" xmlns:cvssv3="https://www.first.org/cvss/cvss-v3.0.xsd" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:ns0="http://purl.org/dc/elements/1.1/" xmlns:prod="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/prod" xmlns:scap-core="http://scap.nist.gov/schema/scap-core/1.0" xmlns:sch="http://purl.oclc.org/dsdl/schematron" xmlns:vuln="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf">
  <DocumentTitle xml:lang="en">CVE-2020-19909</DocumentTitle>
  <DocumentType>SUSE CVE</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE CVE-2020-19909</ID>
    </Identification>
    <Status>Interim</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>2</Number>
        <Date>2023-08-28T23:50:38Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2023-08-23T23:50:59Z</InitialReleaseDate>
    <CurrentReleaseDate>2023-08-28T23:50:38Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf-cve.pl</Engine>
      <Date>2020-12-27T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="CVE" Type="Summary" Ordinal="1" xml:lang="en">CVE-2020-19909</Note>
    <Note Title="Mitre CVE Description" Type="Description" Ordinal="2" xml:lang="en">** DISPUTED ** Integer overflow vulnerability in tool_operate.c in curl 7.65.2 via a large value as the retry delay. NOTE: many parties report that this has no direct security impact on the curl user; however, it may (in theory) cause a denial of service to associated systems or networks if, for example, --retry-delay is misinterpreted as a value much smaller than what was intended. This is not especially plausible because the overflow only happens if the user was trying to specify that curl should wait weeks (or longer) before trying to recover from a transient error.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="4" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/prod">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 12 SP3-TERADATA">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 12 SP3-TERADATA">
        <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP3-TERADATA" CPE="cpe:/o:suse:sles_teradata:12:sp3">SUSE Linux Enterprise Server 12 SP3-TERADATA</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="curl-7.37.0-37.101.1">
      <FullProductName ProductID="curl-7.37.0-37.101.1" CPE="cpe:2.3:a:haxx:curl:7.37.0:*:*:*:*:*:*:*">curl-7.37.0-37.101.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcurl4-32bit-7.37.0-37.101.1">
      <FullProductName ProductID="libcurl4-32bit-7.37.0-37.101.1">libcurl4-32bit-7.37.0-37.101.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcurl4-7.37.0-37.101.1">
      <FullProductName ProductID="libcurl4-7.37.0-37.101.1">libcurl4-7.37.0-37.101.1</FullProductName>
    </Branch>
    <Relationship ProductReference="curl-7.37.0-37.101.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP3-TERADATA">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP3-TERADATA:curl-7.37.0-37.101.1">curl-7.37.0-37.101.1 as a component of SUSE Linux Enterprise Server 12 SP3-TERADATA</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcurl4-7.37.0-37.101.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP3-TERADATA">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP3-TERADATA:libcurl4-7.37.0-37.101.1">libcurl4-7.37.0-37.101.1 as a component of SUSE Linux Enterprise Server 12 SP3-TERADATA</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcurl4-32bit-7.37.0-37.101.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP3-TERADATA">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP3-TERADATA:libcurl4-32bit-7.37.0-37.101.1">libcurl4-32bit-7.37.0-37.101.1 as a component of SUSE Linux Enterprise Server 12 SP3-TERADATA</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** DISPUTED ** Integer overflow vulnerability in tool_operate.c in curl 7.65.2 via a large value as the retry delay. NOTE: many parties report that this has no direct security impact on the curl user; however, it may (in theory) cause a denial of service to associated systems or networks if, for example, --retry-delay is misinterpreted as a value much smaller than what was intended. This is not especially plausible because the overflow only happens if the user was trying to specify that curl should wait weeks (or longer) before trying to recover from a transient error.</Note>
    </Notes>
    <CVE>CVE-2020-19909</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12 SP3-TERADATA:curl-7.37.0-37.101.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP3-TERADATA:libcurl4-7.37.0-37.101.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP3-TERADATA:libcurl4-32bit-7.37.0-37.101.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV3>
        <BaseScoreV3>3.3</BaseScoreV3>
        <VectorV3>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
  </Vulnerability>
</cvrfdoc>
