Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2000-0973Improper Restriction of Operations within the Bounds of a Memory Buffer in Stenberg Curl

7 documents6 sources
Severity
10.0CRITICALNVD
EPSS
12.2%
top 6.13%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedDec 19
Latest updateMay 3

Description

Buffer overflow in curl earlier than 6.0-1.1, and curl-ssl earlier than 6.0-1.2, allows remote attackers to execute arbitrary commands by forcing a long error message to be generated.

CVSS vector

AV:N/AC:L/C:C/I:C/A:CExploitability: 10.0 | Impact: 10.0

Affected Packages1 packages

NVDdaniel_stenberg/curl14 versions+13

Patches

🔴Vulnerability Details

2
GHSA
GHSA-4g26-v2fv-8g5f: Buffer overflow in curl earlier than 62022-05-03
CVEList
CVE-2000-0973: Buffer overflow in curl earlier than 62001-01-22

💥Exploits & PoCs

2
Exploit-DB
cURL 6.1 < 7.4 - Remote Buffer Overflow (1)2000-10-13
Exploit-DB
cURL 6.1 < 7.4 - Remote Buffer Overflow (2)2000-10-13

📋Vendor Advisories

1
Red Hat
security flaw2000-10-13

💬Community

1
Bugzilla
CVE-2000-0973 security flaw2018-08-16
CVE-2000-0973 — Daniel Stenberg Curl vulnerability | cvebase