6.5
CVSSv3

CVE-2017-1000100

Published: 05/10/2017 Updated: 13/11/2018
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
VMScore: 384
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

When doing a TFTP transfer and curl/libcurl is given a URL that contains a very long file name (longer than about 515 bytes), the file name is truncated to fit within the buffer boundaries, but the buffer size is still wrongly updated to use the untruncated length. This too large value is then used in the sendto() call, making curl attempt to send more data than what is actually put into the buffer. The endto() function will then read beyond the end of the heap based buffer. A malicious HTTP(S) server could redirect a vulnerable libcurl-using client to a crafted TFTP URL (if the client hasn't restricted which protocols it allows redirects to) and trick it to send private memory contents to a remote server over UDP. Limit curl's redirect protocols with --proto-redir and libcurl's with CURLOPT_REDIR_PROTOCOLS.

Vulnerable Product Search on Vulmon Subscribe to Product

haxx libcurl 7.52.0

haxx libcurl 7.52.1

haxx libcurl 7.44.0

haxx libcurl 7.45.0

haxx libcurl 7.15.0

haxx libcurl 7.37.0

haxx libcurl 7.42.1

haxx libcurl 7.50.0

haxx libcurl 7.16.0

haxx libcurl 7.16.1

haxx libcurl 7.18.1

haxx libcurl 7.18.2

haxx libcurl 7.19.6

haxx libcurl 7.19.7

haxx libcurl 7.20.0

haxx libcurl 7.21.5

haxx libcurl 7.21.6

haxx libcurl 7.26.0

haxx libcurl 7.27.0

haxx libcurl 7.34.0

haxx libcurl 7.35.0

haxx libcurl 7.54.0

haxx libcurl 7.54.1

haxx libcurl 7.50.3

haxx libcurl 7.47.1

haxx libcurl 7.48.0

haxx libcurl 7.39

haxx libcurl 7.40.0

haxx libcurl 7.15.2

haxx libcurl 7.15.3

haxx libcurl 7.16.4

haxx libcurl 7.17.0

haxx libcurl 7.19.2

haxx libcurl 7.19.3

haxx libcurl 7.21.1

haxx libcurl 7.21.2

haxx libcurl 7.23.0

haxx libcurl 7.23.1

haxx libcurl 7.29.0

haxx libcurl 7.30.0

haxx libcurl 7.53.0

haxx libcurl 7.53.1

haxx libcurl 7.46.0

haxx libcurl 7.47.0

haxx libcurl 7.37.1

haxx libcurl 7.38.0

haxx libcurl 7.50.1

haxx libcurl 7.50.2

haxx libcurl 7.15.1

haxx libcurl 7.16.2

haxx libcurl 7.16.3

haxx libcurl 7.19.0

haxx libcurl 7.19.1

haxx libcurl 7.20.1

haxx libcurl 7.21.0

haxx libcurl 7.21.7

haxx libcurl 7.22.0

haxx libcurl 7.28.0

haxx libcurl 7.28.1

haxx libcurl 7.36.0

haxx libcurl 7.51.0

haxx libcurl 7.43.0

haxx libcurl 7.49.0

haxx libcurl 7.49.1

haxx libcurl 7.41.0

haxx libcurl 7.42.0

haxx libcurl 7.15.4

haxx libcurl 7.15.5

haxx libcurl 7.17.1

haxx libcurl 7.18.0

haxx libcurl 7.19.4

haxx libcurl 7.19.5

haxx libcurl 7.21.3

haxx libcurl 7.21.4

haxx libcurl 7.24.0

haxx libcurl 7.25.0

haxx libcurl 7.31.0

haxx libcurl 7.32.0

haxx libcurl 7.33.0

Vendor Advisories

Synopsis Moderate: httpd24 security, bug fix, and enhancement update Type/Severity Security Advisory: Moderate Topic An update for httpd24-httpd, httpd24-nghttp2, and httpd24-curl is now available for Red Hat Software CollectionsRed Hat Product Security has rated this update as having a security impact of ...
Debian Bug report logs - #871554 curl: CVE-2017-1000101: URL globbing out of bounds read Package: src:curl; Maintainer for src:curl is Alessandro Ghedini <ghedo@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Wed, 9 Aug 2017 07:03:02 UTC Severity: important Tags: fixed-upstream, patch, secur ...
Debian Bug report logs - #871555 curl: CVE-2017-1000100: TFTP sends more than buffer size Package: src:curl; Maintainer for src:curl is Alessandro Ghedini <ghedo@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Wed, 9 Aug 2017 07:09:01 UTC Severity: important Tags: fixed-upstream, patch, secu ...
Several vulnerabilities have been discovered in cURL, an URL transfer library The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2017-1000100 Even Rouault reported that cURL does not properly handle long file names when doing an TFTP upload A malicious HTTP(S) server can take advantage of this fla ...
Several security issues were fixed in curl ...
Several security issues were fixed in curl ...
FILE buffer read out of bounds (CVE-2017-1000099) TFTP sends more than buffer size (CVE-2017-1000100) URL globbing out of bounds read (CVE-2017-1000101) ...
When doing a TFTP transfer and curl/libcurl is given a URL that contains a very long file name (longer than about 515 bytes), the file name is truncated to fit within the buffer boundaries, but the buffer size is still wrongly updated to use the untruncated length This too large value is then used in the sendto() call, making curl attempt to send ...
An information disclosure issue has been found in curl < 7550 When doing a TFTP transfer and curl/libcurl is given a URL that contains a very long file name (longer than about 515 bytes), the file name is truncated to fit within the buffer boundaries, but the buffer size is still wrongly updated to use the untruncated length This too large v ...