SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   curl Vendors:   curl.haxx.se
(Ubuntu Issues Fix) cURL curl_mprintf() Buffer Overflow i Deprecated Function Lets Users Execute Arbitrary Code
SecurityTracker Alert ID:  1039645
SecurityTracker URL:  http://securitytracker.com/id/1039645
CVE Reference:   CVE-2016-9586   (Links to External Site)
Date:  Oct 24 2017
Impact:   Execution of arbitrary code via local system, Execution of arbitrary code via network, User access via local system, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 7.1 - 7.51.0
Description:   A vulnerability was reported in cURL. A remote or local user can execute arbitrary code on the target system.

A user can send specially crafted data to trigger a buffer overflow in performing floating point conversions using certain deprecated curl_mprintf() functions and execute arbitrary code on the target system.

libcurl is affected. The specific impact depends on the application or service using libcurl.

The command line tool is not affected.

Daniel Stenberg reported this vulnerability.

Impact:   A remote or local user can execute arbitrary code on the target system.
Solution:   Ubuntu has issued a fix.

The Ubuntu advisory is available at:

https://www.ubuntu.com/usn/usn-3441-1

Vendor URL:  www.ubuntu.com/usn/usn-3441-2 (Links to External Site)
Cause:   Boundary error
Underlying OS:  Linux (Ubuntu)
Underlying OS Comments:  12.04 ESM

Message History:   This archive entry is a follow-up to the message listed below.
Dec 21 2016 cURL curl_mprintf() Buffer Overflow i Deprecated Function Lets Users Execute Arbitrary Code



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC