Your submission was sent successfully! Close

You have successfully unsubscribed! Close

CVE-2017-1000101

Published: 4 October 2017

curl supports "globbing" of URLs, in which a user can pass a numerical range to have the tool iterate over those numbers to do a sequence of transfers. In the globbing function that parses the numerical range, there was an omission that made curl read a byte beyond the end of the URL if given a carefully crafted, or just wrongly written, URL. The URL is stored in a heap based buffer, so it could then be made to wrongly read something else instead of crashing. An example of a URL that triggers the flaw would be `http://ur%20[0-60000000000000000000`.

Notes

AuthorNote
sbeattie
only affects curl command line tool, not libcurl
introduced in 7.34.0

Priority

Low

CVSS 3 base score: 6.5

Status

Package Release Status
curl
Launchpad, Ubuntu, Debian
precise Not vulnerable

trusty
Released (7.35.0-1ubuntu2.11)
upstream
Released (7.55.0)
xenial
Released (7.47.0-1ubuntu2.3)
zesty
Released (7.52.1-4ubuntu1.2)
Patches:
upstream: https://curl.haxx.se/CVE-2017-1000101.patch
upstream: https://github.com/curl/curl/commit/453e7a7a03a2cec749abd3878a48e728c515cca7