CVE-2006-1061Improper Restriction of Operations within the Bounds of a Memory Buffer in Stenberg Curl

6 documents6 sources
Severity
7.5HIGHNVD
EPSS
3.8%
top 11.85%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 21
Latest updateMay 1

Description

Heap-based buffer overflow in cURL and libcURL 7.15.0 through 7.15.2 allows remote attackers to execute arbitrary commands via a TFTP URL (tftp://) with a valid hostname and a long path.

CVSS vector

AV:N/AC:L/C:P/I:P/A:PExploitability: 10.0 | Impact: 6.4

Affected Packages2 packages

Debianhaxx/curl< 7.15.3-1+3
NVDdaniel_stenberg/curl7.15.0, 7.15.1, 7.15.2+2

Patches

🔴Vulnerability Details

3
GHSA
GHSA-64x8-5wwv-7rw9: Heap-based buffer overflow in cURL and libcURL 72022-05-01
CVEList
CVE-2006-1061: Heap-based buffer overflow in cURL and libcURL 72006-03-21
OSV
CVE-2006-1061: Heap-based buffer overflow in cURL and libcURL 72006-03-21

📋Vendor Advisories

1
Debian
CVE-2006-1061: curl - Heap-based buffer overflow in cURL and libcURL 7.15.0 through 7.15.2 allows remo...2006

💬Community

1
Bugzilla
CVE-2006-1061 cURL tftp buffer overflow2006-03-20
CVE-2006-1061 — Daniel Stenberg Curl vulnerability | cvebase