Multiple integer overflows in the (1) curl_escape, (2) curl_easy_escape, (3) curl_unescape, and (4) curl_easy_unescape functions in libcurl prior to 7.50.3 allow malicious users to have unspecified impact via a string of length 0xffffffff, which triggers a heap-based buffer overflow.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
fedoraproject fedora 25 |
||
fedoraproject fedora 24 |
||
fedoraproject fedora 23 |
||
haxx libcurl |