188
VMScore

CVE-2017-7407

Published: 03/04/2017 Updated: 03/10/2019
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
CVSS v3 Base Score: 2.4 | Impact Score: 1.4 | Exploitability Score: 0.9
VMScore: 188
Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

The ourWriteOut function in tool_writeout.c in curl 7.53.1 might allow physically proximate malicious users to obtain sensitive information from process memory in opportunistic circumstances by reading a workstation screen during use of a --write-out argument ending in a '%' character, which leads to a heap-based buffer over-read.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

haxx curl 7.53.1

Vendor Advisories

Synopsis Moderate: httpd24 security, bug fix, and enhancement update Type/Severity Security Advisory: Moderate Topic An update for httpd24-httpd, httpd24-nghttp2, and httpd24-curl is now available for Red Hat Software CollectionsRed Hat Product Security has rated this update as having a security impact of ...
Debian Bug report logs - #859500 curl: CVE-2017-7407 Package: src:curl; Maintainer for src:curl is Alessandro Ghedini <ghedo@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Tue, 4 Apr 2017 12:15:01 UTC Severity: normal Tags: fixed-upstream, patch, security, upstream Found in version curl/7 ...
Several security issues were fixed in curl ...
Several security issues were fixed in curl ...
The ourWriteOut function in tool_writeoutc in curl 7531 might allow physically proximate attackers to obtain sensitive information from process memory in opportunistic circumstances by reading a workstation screen during use of a --write-out argument ending in a certain character, which leads to a heap-based buffer over-read(CVE-2017-7407 ) ...
The ourWriteOut function in tool_writeoutc in curl 7531 might allow physically proximate attackers to obtain sensitive information from process memory in opportunistic circumstances by reading a workstation screen during use of a --write-out argument ending in a '%' character, which leads to a heap-based buffer over-read ...