CVE-2017-7407
Published: 3 April 2017
The ourWriteOut function in tool_writeout.c in curl 7.53.1 might allow physically proximate attackers to obtain sensitive information from process memory in opportunistic circumstances by reading a workstation screen during use of a --write-out argument ending in a '%' character, which leads to a heap-based buffer over-read.
Notes
Author | Note |
---|---|
tyhicks | Affected code is in src/writeout.c in older releases |
mdeslaur | first commit is in 7.52.1-4, second one isn't |
Priority
CVSS 3 base score: 2.4
Status
Package | Release | Status |
---|---|---|
curl Launchpad, Ubuntu, Debian |
artful |
Not vulnerable
(7.55.1-1ubuntu1)
|
precise |
Released
(7.22.0-3ubuntu4.18)
|
|
trusty |
Released
(7.35.0-1ubuntu2.11)
|
|
upstream |
Released
(7.54.0,7.52.1-4)
|
|
xenial |
Released
(7.47.0-1ubuntu2.3)
|
|
yakkety |
Ignored
(reached end-of-life)
|
|
zesty |
Released
(7.52.1-4ubuntu1.2)
|
|
Patches: upstream: https://github.com/curl/curl/commit/1890d59905414ab84a35892b2e45833654aa5c13 upstream: https://github.com/curl/curl/commit/8e65877870c1fac920b65219adec720df810aab9 |