Your submission was sent successfully! Close

You have successfully unsubscribed! Close

CVE-2017-7407

Published: 3 April 2017

The ourWriteOut function in tool_writeout.c in curl 7.53.1 might allow physically proximate attackers to obtain sensitive information from process memory in opportunistic circumstances by reading a workstation screen during use of a --write-out argument ending in a '%' character, which leads to a heap-based buffer over-read.

Notes

AuthorNote
tyhicks
Affected code is in src/writeout.c in older releases
mdeslaur
first commit is in 7.52.1-4, second one isn't

Priority

Negligible

CVSS 3 base score: 2.4

Status

Package Release Status
curl
Launchpad, Ubuntu, Debian
artful Not vulnerable
(7.55.1-1ubuntu1)
precise
Released (7.22.0-3ubuntu4.18)
trusty
Released (7.35.0-1ubuntu2.11)
upstream
Released (7.54.0,7.52.1-4)
xenial
Released (7.47.0-1ubuntu2.3)
yakkety Ignored
(reached end-of-life)
zesty
Released (7.52.1-4ubuntu1.2)
Patches:
upstream: https://github.com/curl/curl/commit/1890d59905414ab84a35892b2e45833654aa5c13
upstream: https://github.com/curl/curl/commit/8e65877870c1fac920b65219adec720df810aab9