Multiple off-by-one errors in the cURL library (libcurl) 7.11.2 up to and including 7.15.0 allow local users to trigger a buffer overflow and cause a denial of service or bypass PHP security restrictions via certain URLs that (1) are malformed in a way that prevents a terminating null byte from being added to either a hostname or path buffer, or (2) contain a "?" separator in the hostname portion, which causes a "/" to be prepended to the resulting string.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
daniel stenberg curl 7.13 |
||
daniel stenberg curl 7.13.1 |
||
daniel stenberg curl 7.11.2 |
||
daniel stenberg curl 7.13.2 |
||
daniel stenberg curl 7.14 |
||
daniel stenberg curl 7.12.2 |
||
daniel stenberg curl 7.12.3 |
||
daniel stenberg curl 7.12 |
||
daniel stenberg curl 7.12.1 |
||
daniel stenberg curl 7.14.1 |
||
daniel stenberg curl 7.15 |