CVE-2017-1000101
Publication date 4 October 2017
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
curl supports "globbing" of URLs, in which a user can pass a numerical range to have the tool iterate over those numbers to do a sequence of transfers. In the globbing function that parses the numerical range, there was an omission that made curl read a byte beyond the end of the URL if given a carefully crafted, or just wrongly written, URL. The URL is stored in a heap based buffer, so it could then be made to wrongly read something else instead of crashing. An example of a URL that triggers the flaw would be `http://ur%20[0-60000000000000000000`.
Status
Package | Ubuntu Release | Status |
---|---|---|
curl | ||
16.04 LTS xenial |
Fixed 7.47.0-1ubuntu2.3
|
|
14.04 LTS trusty |
Fixed 7.35.0-1ubuntu2.11
|
Notes
Patch details
Package | Patch details |
---|---|
curl |
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 6.5 · Medium |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | Required |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | None |
Availability impact | None |
Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N |
References
Related Ubuntu Security Notices (USN)
- USN-3441-1
- curl vulnerabilities
- 10 October 2017