vendor:
curl
by:
zillion
7.5
CVSS
HIGH
Buffer Overflow
120
CWE
Product Name: curl
Affected Version From: 6.1
Affected Version To: 7.4
Patch Exists: YES
Related CWE: CVE-2001-0332
CPE: a:curl:curl
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux
2001
Curl Remote Exploit
Curl's error-logging feature improperly tests the size of generated error messages, which are sent from a remote host. A malicious remote server could send a maliciously-formed response to a request from curl, designed to exceed the maximum length of the error buffer. The contents of this oversized buffer, when copied onto the stack, can potentially overwrite the calling functions' return address. This can alter the program's flow of execution and result in arbitrary code being run on the client host.
Mitigation:
Upgrade to the latest version of curl.