4.3
CVSSv2

CVE-2017-1000101

Published: 05/10/2017 Updated: 13/11/2018
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
VMScore: 384
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

curl supports "globbing" of URLs, in which a user can pass a numerical range to have the tool iterate over those numbers to do a sequence of transfers. In the globbing function that parses the numerical range, there was an omission that made curl read a byte beyond the end of the URL if given a carefully crafted, or just wrongly written, URL. The URL is stored in a heap based buffer, so it could then be made to wrongly read something else instead of crashing. An example of a URL that triggers the flaw would be `ur%20[0-60000000000000000000`.

Vulnerable Product Search on Vulmon Subscribe to Product

haxx curl 7.39.0

haxx curl 7.4.1

haxx curl 7.46.0

haxx curl 7.47.0

haxx curl 7.50.2

haxx curl 7.50.3

haxx curl 7.54.1

haxx curl 7.55.0

haxx curl 7.35.0

haxx curl 7.40.0

haxx curl 7.41.0

haxx curl 7.47.1

haxx curl 7.48.0

haxx curl 7.51.0

haxx curl 7.52.0

haxx curl 7.37.1

haxx curl 7.38.0

haxx curl 7.44.0

haxx curl 7.45.0

haxx curl 7.50.0

haxx curl 7.50.1

haxx curl 7.53.1

haxx curl 7.54.0

haxx curl 7.36.0

haxx curl 7.37.0

haxx curl 7.42.0

haxx curl 7.42.1

haxx curl 7.43.0

haxx curl 7.49.0

haxx curl 7.49.1

haxx curl 7.52.1

haxx curl 7.53.0

Vendor Advisories

Synopsis Moderate: httpd24 security, bug fix, and enhancement update Type/Severity Security Advisory: Moderate Topic An update for httpd24-httpd, httpd24-nghttp2, and httpd24-curl is now available for Red Hat Software CollectionsRed Hat Product Security has rated this update as having a security impact of ...
Debian Bug report logs - #871554 curl: CVE-2017-1000101: URL globbing out of bounds read Package: src:curl; Maintainer for src:curl is Alessandro Ghedini <ghedo@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Wed, 9 Aug 2017 07:03:02 UTC Severity: important Tags: fixed-upstream, patch, secur ...
Debian Bug report logs - #871555 curl: CVE-2017-1000100: TFTP sends more than buffer size Package: src:curl; Maintainer for src:curl is Alessandro Ghedini <ghedo@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Wed, 9 Aug 2017 07:09:01 UTC Severity: important Tags: fixed-upstream, patch, secu ...
Several vulnerabilities have been discovered in cURL, an URL transfer library The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2017-1000100 Even Rouault reported that cURL does not properly handle long file names when doing an TFTP upload A malicious HTTP(S) server can take advantage of this fla ...
Several security issues were fixed in curl ...
Several security issues were fixed in curl ...
FILE buffer read out of bounds (CVE-2017-1000099) TFTP sends more than buffer size (CVE-2017-1000100) URL globbing out of bounds read (CVE-2017-1000101) ...
curl supports "globbing" of URLs, in which a user can pass a numerical range to have the tool iterate over those numbers to do a sequence of transfers In the globbing function that parses the numerical range, there was an omission that made curl read a byte beyond the end of the URL if given a carefully crafted, or just wrongly written, URL The U ...
A heap-based read buffer overflow has been found in curl < 7550 In the globbing function that parses the numerical range, there was an omission that made curl read a byte beyond the end of the URL if given a carefully crafted, or just wrongly written, URL The URL is stored in a heap based buffer, so it could then be made to wrongly read some ...