CVE-2017-9502Improper Restriction of Operations within the Bounds of a Memory Buffer in Curl

Severity
5.3MEDIUMNVD
EPSS
0.6%
top 31.84%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJun 14
Latest updateMay 17

Description

In curl before 7.54.1 on Windows and DOS, libcurl's default protocol function, which is the logic that allows an application to set which protocol libcurl should attempt to use when given a URL without a scheme part, had a flaw that could lead to it overwriting a heap based memory buffer with seven bytes. If the default protocol is specified to be FILE or a file: URL lacks two slashes, the given "URL" starts with a drive letter, and libcurl is built for Windows or DOS, then libcurl would copy th

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:LExploitability: 3.9 | Impact: 1.4

Affected Packages1 packages

NVDhaxx/curl7.54.0

🔴Vulnerability Details

2
GHSA
GHSA-2p6v-q44g-p7m7: In curl before 72022-05-17
CVEList
CVE-2017-9502: In curl before 72017-06-14

📋Vendor Advisories

2
Red Hat
curl: URL file scheme drive letter buffer overflow2017-06-14
Debian
CVE-2017-9502: curl - In curl before 7.54.1 on Windows and DOS, libcurl's default protocol function, w...2017

💬Community

1
Bugzilla
CVE-2017-9502 curl: URL file scheme drive letter buffer overflow2017-06-14
CVE-2017-9502 — Haxx Curl vulnerability | cvebase